SlideShare a Scribd company logo
1 of 72
Download to read offline
C H A P T E R
1-1
Cisco ASA Series CLI Configuration Guide
1
Configuring a Cluster of ASAs
Clustering lets you group multiple ASAs together as a single logical device. A cluster provides all the
convenience of a single device (management, integration into a network) while achieving the increased
throughput and redundancy of multiple devices.
Note Some features are not supported when using clustering. See the “Unsupported Features” section on
page 1-17.
• Information About ASA Clustering, page 1-1
• Licensing Requirements for ASA Clustering, page 1-23
• Prerequisites for ASA Clustering, page 1-23
• Guidelines and Limitations, page 1-24
• Default Settings, page 1-27
• Configuring ASA Clustering, page 1-27
• Managing ASA Cluster Members, page 1-47
• Monitoring the ASA Cluster, page 1-52
• Configuration Examples for ASA Clustering, page 1-56
• Feature History for ASA Clustering, page 1-71
Information About ASA Clustering
• How the ASA Cluster Fits into Your Network, page 1-2
• Performance Scaling Factor, page 1-2
• Cluster Members, page 1-2
• ASA Cluster Interfaces, page 1-4
• Cluster Control Link, page 1-6
• High Availability within the ASA Cluster, page 1-9
• Configuration Replication, page 1-10
• ASA Cluster Management, page 1-10
• Load Balancing Methods, page 1-12
1-2
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
• How the ASA Cluster Manages Connections, page 1-15
• ASA Features and Clustering, page 1-17
How the ASA Cluster Fits into Your Network
The cluster consists of multiple ASAs acting as a single unit. (See the “Licensing Requirements for ASA
Clustering” section on page 1-23 for the number of units supported per model). To act as a cluster, the
ASAs need the following infrastructure:
• Isolated, high-speed backplane network for intra-cluster communication, known as the cluster
control link. See the “Cluster Control Link” section on page 1-6.
• Management access to each ASA for configuration and monitoring. See the “ASA Cluster
Management” section on page 1-10.
When you place the cluster in your network, the upstream and downstream routers need to be able to
load-balance the data coming to and from the cluster using one of the following methods:
• Spanned EtherChannel (Recommended)—Interfaces on multiple members of the cluster are
grouped into a single EtherChannel; the EtherChannel performs load balancing between units. See
the “Spanned EtherChannel (Recommended)” section on page 1-12.
• Policy-Based Routing (Routed firewall mode only)—The upstream and downstream routers perform
load balancing between units using route maps and ACLs. See the “Policy-Based Routing (Routed
Firewall Mode Only)” section on page 1-14.
• Equal-Cost Multi-Path Routing (Routed firewall mode only)—The upstream and downstream
routers perform load balancing between units using equal cost static or dynamic routes. See the
“Equal-Cost Multi-Path Routing (Routed Firewall Mode Only)” section on page 1-15.
Performance Scaling Factor
When you combine multiple units into a cluster, you can expect a performance of approximately:
• 70% of the combined throughput
• 60% of maximum connections
• 50% of connections per second
For example, for throughput, the ASA 5585-X with SSP-40 can handle approximately 10 Gbps of real
world firewall traffic when running alone. For a cluster of 8 units, the maximum combined throughput
will be approximately 70% of 80 Gbps (8 units x 10 Gbps): 56 Gbps.
Cluster Members
• ASA Hardware and Software Requirements, page 1-3
• Bootstrap Configuration, page 1-3
• Master and Slave Unit Roles, page 1-3
• Master Unit Election, page 1-3
1-3
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
ASA Hardware and Software Requirements
All units in a cluster:
• Must be the same model with the same DRAM. You do not have to have the same amount of flash
memory.
• Must run the identical software except at the time of an image upgrade. Hitless upgrade is supported
between any maintenance releases within a minor release (such as 9.0(1) to 9.0(4)), adjacent minor
releases (such as 9.0 to 9.1), and last minor release of previous version to the next major release
(such as 8.6 to 9.0, where 8.6 is the last version available for your model previous to 9.0).
• Must be in the same geographical location.
• Must be in the same security context mode, single or multiple.
• (Single context mode) Must be in the same firewall mode, routed or transparent.
• New cluster members must use the same SSL encryption setting (the ssl encryption command) as
the master unit for initial cluster control link communication before configuration replication.
Bootstrap Configuration
On each device, you configure a minimal bootstrap configuration including the cluster name, cluster
control link interface, and other cluster settings. The first unit on which you enable clustering typically
becomes the master unit. When you enable clustering on subsequent units, they join the cluster as slaves.
Master and Slave Unit Roles
One member of the cluster is the master unit. The master unit is determined by the priority setting in the
bootstrap configuration; the priority is set between 1 and 100, where 1 is the highest priority. All other
members are slave units. Typically, when you first create a cluster, the first unit you add becomes the
master unit simply because it is the only unit in the cluster so far.
You must perform all configuration (aside from the bootstrap configuration) on the master unit only; the
configuration is then replicated to the slave units. In the case of physical assets, such as interfaces, the
configuration of the master unit is mirrored on all slave units. For example, if you configure
GigabitEthernet 0/1 as the inside interface and GigabitEthernet 0/0 as the outside interface, then these
interfaces are also used on the slave units as inside and outside interfaces.
Some features do not scale in a cluster, and the master unit handles all traffic for those features. See the
“Centralized Features” section on page 1-18.
Master Unit Election
Members of the cluster communicate over the cluster control link to elect a master unit as follows:
1. When you enable clustering for a unit (or when it first starts up with clustering already enabled), it
broadcasts an election request every 3 seconds.
2. Any other units with a higher priority respond to the election request; the priority is set between 1
and 100, where 1 is the highest priority.
3. If after 45 seconds, a unit does not receive a response from another unit with a higher priority, then
it becomes master.
1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Note If multiple units tie for the highest priority, the cluster unit name and then the serial number
is used to determine the master.
4. If a unit later joins the cluster with a higher priority, it does not automatically become the master
unit; the existing master unit always remains as the master unless it stops responding, at which point
a new master unit is elected.
Note You can manually force a unit to become the master. For centralized features, if you force a master unit
change, then all connections are dropped, and you have to re-establish the connections on the new master
unit. See the “Centralized Features” section on page 1-18 for a list of centralized features.
ASA Cluster Interfaces
You can configure data interfaces as either Spanned EtherChannels or as Individual interfaces. All data
interfaces in the cluster must be one type only.
• Interface Types, page 1-4
• Interface Type Mode, page 1-6
Interface Types
• Spanned EtherChannel (Recommended)
You can group one or more interfaces per unit into an EtherChannel that spans all units in the cluster.
The EtherChannel aggregates the traffic across all the available active interfaces in the channel. A
Spanned EtherChannel can be configured in both routed and transparent firewall modes. In routed
mode, the EtherChannel is configured as a routed interface with a single IP address. In transparent
mode, the IP address is assigned to the bridge group, not to the interface. The EtherChannel
inherently provides load balancing as part of basic operation. See also the “Spanned EtherChannel
(Recommended)” section on page 1-12.
1-5
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
• Individual interfaces (Routed firewall mode only)
Individual interfaces are normal routed interfaces, each with their own Local IP address. Because
interface configuration must be configured only on the master unit, the interface configuration lets
you set a pool of IP addresses to be used for a given interface on the cluster members, including one
for the master. The Main cluster IP address is a fixed address for the cluster that always belongs to
the current master unit. The Main cluster IP address is a secondary IP address for the master unit;
the Local IP address is always the primary address for routing. The Main cluster IP address provides
consistent management access to an address; when a master unit changes, the Main cluster IP
address moves to the new master unit, so management of the cluster continues seamlessly. Load
balancing, however, must be configured separately on the upstream switch in this case. For
information about load balancing, see the “Load Balancing Methods” section on page 1-12.
Note We recommend Spanned EtherChannels instead of Individual interfaces because Individual
interfaces rely on routing protocols to load-balance traffic, and routing protocols often have
slow convergence during a link failure.
ASA1
ASA2
ASA3
ASA4
ten0/8 ten0/9
ten0/9
ten0/9
ten0/9
ten0/8
ten0/8
ten0/8
port-channel 5 port-channel 6
Inside
Spanned
port-channel 1
10.1.1.1
Outside
Spanned
port-channel 2
209.165.201.1
Outside SwitchInside Switch
333361
1-6
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Interface Type Mode
You must choose the interface type (Spanned EtherChannel or Individual) before you configure your
devices. See the following guidelines for the interface type mode:
• You can always configure the management-only interface as an Individual interface (recommended),
even in Spanned EtherChannel mode. The management interface can be an Individual interface even
in transparent firewall mode.
• In Spanned EtherChannel mode, if you configure the management interface as an Individual
interface, you cannot enable dynamic routing for the management interface. You must use a static
route.
• In multiple context mode, you must choose one interface type for all contexts. For example, if you
have a mix of transparent and routed mode contexts, you must use Spanned EtherChannel mode for
all contexts because that is the only interface type allowed for transparent mode.
Cluster Control Link
Each unit must dedicate at least one hardware interface as the cluster control link.
• Cluster Control Link Traffic Overview, page 1-7
• Cluster Control Link Network, page 1-7
• Sizing the Cluster Control Link, page 1-7
• Cluster Control Link Redundancy, page 1-8
ASA1/Master
ASA2
ASA3
ASA4
inside ten0/8
10.1.1.1 (master)
10.1.1.2 (local)
inside ten0/8
10.1.1.3 (local)
inside ten0/8
10.1.1.4 (local)
inside ten0/8
10.1.1.5 (local)
ten0/9 outside
209.165.201.1 (master)
209.165.201.2 (local)
ten0/9 outside
209.165.201.3 (local)
ten0/9 outside
209.165.201.4 (local)
ten0/9 outside
209.165.201.5 (local)
ten0/0
Load Balancing:
PBR or ECMP
Load Balancing:
PBR or ECMP
ten0/1
ten0/2
ten0/3
ten0/0
ten0/1
ten0/2
ten0/3
Outside SwitchInside Switch
333359
1-7
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
• Cluster Control Link Latency and Reliability, page 1-8
• Cluster Control Link Failure, page 1-8
Cluster Control Link Traffic Overview
Cluster control link traffic includes both control and data traffic.
Control traffic includes:
• Master election. (See the “Cluster Members” section on page 1-2.)
• Configuration replication. (See the “Configuration Replication” section on page 1-10.)
• Health monitoring. (See the “Unit Health Monitoring” section on page 1-9.)
Data traffic includes:
• State replication. (See the “Data Path Connection State Replication” section on page 1-9.)
• Connection ownership queries and data packet forwarding. (See the “Rebalancing New TCP
Connections Across the Cluster” section on page 1-17.)
Cluster Control Link Network
Each cluster control link has an IP address on the same subnet. This subnet should be isolated from all
other traffic, and should include only the ASA cluster control link interfaces.
For a 2-member cluster, do not directly-connect the cluster control link from one ASA to the other ASA.
If you directly connect the interfaces, then when one unit fails, the cluster control link fails, and thus the
remaining healthy unit fails. If you connect the cluster control link through a switch, then the cluster
control link remains up for the healthy unit.
Sizing the Cluster Control Link
You should assign an equal amount of bandwidth to the cluster control link as you assign for through
traffic. For example, if you have the ASA 5585-X with SSP-60, which can pass 14 Gbps per unit
maximum in a cluster, then you should also assign interfaces to the cluster control link that can pass
approximately 14 Gbps. In this case, you could use 2 Ten Gigabit Ethernet interfaces in an EtherChannel
for the cluster control link, and use the rest of the interfaces as desired for data links.
Cluster control link traffic is comprised mainly of state update and forwarded packets. The amount of
traffic at any given time on the cluster control link varies. For example state updates could consume up
to 10% of the through traffic amount if through traffic consists exclusively of short-lived TCP
connections. The amount of forwarded traffic depends on the load-balancing efficacy or whether there
is a lot of traffic for centralized features. For example:
• NAT results in poor load balancing of connections, and the need to rebalance all returning traffic to
the correct units.
• AAA for network access is a centralized feature, so all traffic is forwarded to the master unit.
• When membership changes, the cluster needs to rebalance a large number of connections, thus
temporarily using a large amount of cluster control link bandwidth.
A higher-bandwidth cluster control link helps the cluster to converge faster when there are membership
changes and prevents throughput bottlenecks.
1-8
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Note If your cluster has large amounts of asymmetric (rebalanced) traffic, then the cluster control link should
be even larger.
Cluster Control Link Redundancy
We recommend using an EtherChannel for the cluster control link, so you can pass traffic on multiple
links in the EtherChannel while still achieving redundancy.
The following diagram shows how to use an EtherChannel as a cluster control link in a Virtual Switching
System (VSS) or Virtual Port Channel (vPC) environment. All links in the EtherChannel are active.
When the switch is part of a VSS or vPC, then you can connect ASA interfaces within the same
EtherChannel to separate switches in the VSS or vPC. The switch interfaces are members of the same
EtherChannel port-channel interface, because the separate switches act like a single switch. Note that
this EtherChannel is device-local, not a Spanned EtherChannel.
Cluster Control Link Latency and Reliability
To ensure cluster control link functionality, be sure the round-trip time (RTT) between units is less than
the following:
• 5 ms
To check your latency, perform a ping on the cluster control link between units.
The cluster control link must be reliable, with no out-of-order or dropped packets.
Cluster Control Link Failure
If the cluster control link line protocol goes down for a unit, then clustering is disabled; data interfaces
are shut down until you manually re-enable clustering on each affected unit (after you fix the cluster
control link.)
Note When an ASA becomes inactive, all data interfaces are shut down; only the management-only interface
can send and receive traffic. The management interface remains up using the IP address the unit received
from the cluster IP pool. However if you reload, and the unit is still inactive in the cluster, the
management interface is not accessible (because it then uses the Main IP address, which is the same as
the master unit). You must use the console port for any further configuration.
Switch Switch
Virtual Switch Link
333222
ASA1 ASA2 ASA3
1-9
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
High Availability within the ASA Cluster
• Unit Health Monitoring, page 1-9
• Interface monitoring, page 1-9
• Unit or Interface Failure, page 1-9
• Data Path Connection State Replication, page 1-9
Unit Health Monitoring
The master unit monitors every slave unit by sending keepalive messages over the cluster control link
periodically (the period is configurable). Each slave unit monitors the master unit using the same
mechanism.
Interface monitoring
Each unit monitors the link status of all hardware interfaces in use, and reports status changes to the
master unit.
• Spanned EtherChannel—Uses cluster Link Aggregation Control Protocol (cLACP). Each unit
monitors the link status and the cLACP protocol messages to determine if the port is still active in
the EtherChannel. The status is reported to the master unit.
• Individual interfaces (Routed mode only)—Each unit self-monitors its interfaces and reports
interface status to the master unit.
Unit or Interface Failure
When health monitoring is enabled, a unit is removed from the cluster if it fails or if its interfaces fail.
If an interface fails on a particular unit, but the same interface is active on other units, then the unit is
removed from the cluster.
When a unit in the cluster fails, the connections hosted by that unit are seamlessly transferred to other
units; state information for traffic flows is shared over the control cluster link.
If the master unit fails, then another member of the cluster with the highest priority (lowest number)
becomes the master.
Note When an ASA becomes inactive (either manually or through a health check failure), all data interfaces
are shut down; only the management-only interface can send and receive traffic. The management
interface remains up using the IP address the unit received from the cluster IP pool. However if you
reload, and the unit is still inactive in the cluster, the management interface is not accessible (because it
then uses the Main IP address, which is the same as the master unit). You must use the console port for
any further configuration.
Data Path Connection State Replication
Every connection has one owner and at least one backup owner in the cluster. The backup owner does
not take over the connection in the event of a failure; instead, it stores TCP/UDP state information, so
that the connection can be seamlessly transferred to a new owner in case of a failure.
1-10
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
If the owner becomes unavailable, the first unit to receive packets from the connection (based on load
balancing) contacts the backup owner for the relevant state information so it can become the new owner.
Some traffic requires state information above the TCP or UDP layer. See Table 1-1 for clustering support
or lack of support for this kind of traffic.
Configuration Replication
All units in the cluster share a single configuration. Except for the initial bootstrap configuration, you
can only make configuration changes on the master unit, and changes are automatically replicated to all
other units in the cluster.
ASA Cluster Management
• Management Network, page 1-10
• Management Interface, page 1-10
• Master Unit Management Vs. Slave Unit Management, page 1-11
• RSA Key Replication, page 1-11
• ASDM Connection Certificate IP Address Mismatch, page 1-11
Management Network
We recommend connecting all units to a single management network. This network is separate from the
cluster control link.
Management Interface
For the management interface, we recommend using one of the dedicated management interfaces. You
can configure the management interfaces as Individual interfaces (for both routed and transparent
modes) or as a Spanned EtherChannel interface.
Table 1-1 ASA Features Replicated Across the Cluster
Traffic State Support Notes
Up time Yes Keeps track of the system up time.
ARP Table Yes Transparent mode only.
MAC address table Yes Transparent mode only.
User Identity Yes Includes AAA rules (uauth) and identify firewall.
IPv6 Neighbor database Yes
Dynamic routing Yes
Multi-site licensing No
SNMP Engine ID No
VPN (Site-to-Site) No VPN sessions will be disconnected if the master
unit fails.
1-11
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
We recommend using Individual interfaces for management, even if you use Spanned EtherChannels for
your data interfaces. Individual interfaces let you connect directly to each unit if necessary, while a
Spanned EtherChannel interface only allows remote connection to the current master unit.
Note If you use Spanned EtherChannel interface mode, and configure the management interface as an
Individual interface, you cannot enable dynamic routing for the management interface. You must use a
static route.
For an Individual interface, the Main cluster IP address is a fixed address for the cluster that always
belongs to the current master unit. For each interface, you also configure a range of addresses so that
each unit, including the current master, can use a Local address from the range. The Main cluster IP
address provides consistent management access to an address; when a master unit changes, the Main
cluster IP address moves to the new master unit, so management of the cluster continues seamlessly. The
Local IP address is used for routing, and is also useful for troubleshooting.
For example, you can manage the cluster by connecting to the Main cluster IP address, which is always
attached to the current master unit. To manage an individual member, you can connect to the Local IP
address.
For outbound management traffic such as TFTP or syslog, each unit, including the master unit, uses the
Local IP address to connect to the server.
For a Spanned EtherChannel interface, you can only configure one IP address, and that IP address is
always attached to the master unit. You cannot connect directly to a slave unit using the EtherChannel
interface; we recommend configuring the management interface as an Individual interface so you can
connect to each unit. Note that you can use a device-local EtherChannel for management.
Master Unit Management Vs. Slave Unit Management
Aside from the bootstrap configuration, all management and monitoring can take place on the master
unit. From the master unit, you can check runtime statistics, resource usage, or other monitoring
information of all units. You can also issue a command to all units in the cluster, and replicate the console
messages from slave units to the master unit.
You can monitor slave units directly if desired. Although also available from the master unit, you can
perform file management on slave units (including backing up the configuration and updating images).
The following functions are not available from the master unit:
• Monitoring per-unit cluster-specific statistics.
• Syslog monitoring per unit.
RSA Key Replication
When you create an RSA key on the master unit, the key is replicated to all slave units. If you have an
SSH session to the Main cluster IP address, you will be disconnected if the master unit fails. The new
master unit uses the same key for SSH connections, so you do not need to update the cached SSH host
key when you reconnect to the new master unit.
ASDM Connection Certificate IP Address Mismatch
By default, a self-signed certificate is used for the ASDM connection based on the Local IP address. If
you connect to the Main cluster IP address using ASDM, then a warning message about a mismatched
IP address appears because the certificate uses the Local IP address, and not the Main cluster IP address.
1-12
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
You can ignore the message and establish the ASDM connection. However, to avoid this type of warning,
you can enroll a certificate that contains the Main cluster IP address and all the Local IP addresses from
the IP address pool. You can then use this certificate for each cluster member. For more information, see
Chapter 1, “Configuring Digital Certificates.”
Load Balancing Methods
See also the “ASA Cluster Interfaces” section on page 1-4.
• Spanned EtherChannel (Recommended), page 1-12
• Policy-Based Routing (Routed Firewall Mode Only), page 1-14
• Equal-Cost Multi-Path Routing (Routed Firewall Mode Only), page 1-15
Spanned EtherChannel (Recommended)
You can group one or more interfaces per unit into an EtherChannel that spans all units in the cluster.
The EtherChannel aggregates the traffic across all the available active interfaces in the channel.
• Spanned EtherChannel Benefits, page 1-12
• Guidelines for Maximum Throughput, page 1-12
• Load Balancing, page 1-13
• EtherChannel Redundancy, page 1-13
• Connecting to a VSS or vPC, page 1-13
Spanned EtherChannel Benefits
The EtherChannel method of load-balancing is recommended over other methods for the following
benefits:
• Faster failure discovery.
• Faster convergence time. Individual interfaces rely on routing protocols to load-balance traffic, and
routing protocols often have slow convergence during a link failure.
• Ease of configuration.
For more information about EtherChannels in general (not just for clustering), see the “EtherChannels”
section on page 1-5.
Guidelines for Maximum Throughput
To achieve maximum throughput, we recommend the following:
• Use a load balancing hash algorithm that is “symmetric,” meaning that packets from both directions
will have the same hash, and will be sent to the same ASA in the Spanned EtherChannel. We
recommend using the source and destination IP address (the default) or the source and destination
port as the hashing algorithm.
• Use the same type of line cards when connecting the ASAs to the switch so that hashing algorithms
applied to all packets are the same.
1-13
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Load Balancing
The EtherChannel link is selected using a proprietary hash algorithm, based on source or destination IP
addresses and TCP and UDP port numbers.
Note On the ASA, do not change the load-balancing algorithm from the default (see the “Customizing the
EtherChannel” section on page 1-30). On the switch, we recommend that you use one of the following
algorithms: source-dest-ip or source-dest-ip-port (see the Nexus OS or IOS port-channel
load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause
unevenly distributed traffic to the ASAs in a cluster.
The number of links in the EtherChannel affects load balancing. See the “Load Balancing” section on
page 1-7 for more information.
Symmetric load balancing is not always possible. If you configure NAT, then forward and return packets
will have different IP addresses and/or ports. Return traffic will be sent to a different unit based on the
hash, and the cluster will have to redirect most returning traffic to the correct unit. See the “NAT” section
on page 1-21 for more information.
EtherChannel Redundancy
The EtherChannel has built-in redundancy. It monitors the line protocol status of all links. If one link
fails, traffic is re-balanced between remaining links. If all links in the EtherChannel fail on a particular
unit, but other units are still active, then the unit is removed from the cluster.
Connecting to a VSS or vPC
You can include multiple interfaces per ASA in the Spanned EtherChannel. Multiple interfaces per ASA
are especially useful for connecting to both switches in a VSS or vPC. Keep in mind that an
EtherChannel can have only 8 active interfaces out of 16 maximum; the remaining 8 interfaces are on
standby in case of link failure. The following figure shows a 4-ASA cluster and an 8-ASA cluster, both
with a total of 16 links in the EtherChannel. The active links are shown as solid lines, while the inactive
links are dotted. cLACP load-balancing can automatically choose the best 8 links to be active in the
EtherChannel. As shown, cLACP helps achieve load balancing at the link level.
1-14
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Policy-Based Routing (Routed Firewall Mode Only)
When using Individual interfaces, each ASA interface maintains its own IP address and MAC address.
One method of load balancing is Policy-Based Routing (PBR).
We recommend this method if you are already using PBR, and want to take advantage of your existing
infrastructure. This method might offer additional tuning options vs. Spanned EtherChannel as well.
PBR makes routing decisions based on a route map and ACL. You must manually divide traffic between
all ASAs in a cluster. Because PBR is static, it may not achieve the optimum load balancing result at all
times. To achieve the best performance, we recommend that you configure the PBR policy so that
forward and return packets of a connection are directed to the same physical ASA. For example, if you
have a Cisco router, redundancy can be achieved by using IOS PBR with Object Tracking. IOS Object
Tracking monitors each ASA using ICMP ping. PBR can then enable or disable route maps based on
reachability of a particular ASA. See the following URLs for more details:
http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a4409.shtml
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtpbrtrk.html#wp1057830
Note If you use this method of load-balancing, you can use a device-local EtherChannel as an Individual
interface.
Router or
Access Switch
Virtual Switch Link
Router or
Access Switch
Virtual Switch Link
333215
ASA1
ASA2
ASA3
ASA4
ASA1
ASA8
Switch 2Switch 1Switch 2Switch 1
port-channel1 port-channel1 port-channel1port-channel1
1-15
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Equal-Cost Multi-Path Routing (Routed Firewall Mode Only)
When using Individual interfaces, each ASA interface maintains its own IP address and MAC address.
One method of load balancing is Equal-Cost Multi-Path (ECMP) routing.
We recommend this method if you are already using ECMP, and want to take advantage of your existing
infrastructure. This method might offer additional tuning options vs. Spanned EtherChannel as well.
ECMP routing can forward packets over multiple “best paths” that tie for top place in the routing metric.
Like EtherChannel, a hash of source and destination IP addresses and/or source and destination ports can
be used to send a packet to one of the next hops. If you use static routes for ECMP routing, then an ASA
failure can cause problems; the route continues to be used, and traffic to the failed ASA will be lost. If
you use static routes, be sure to use a static route monitoring feature such as Object Tracking. We
recommend using dynamic routing protocols to add and remove routes, in which case, you must
configure each ASA to participate in dynamic routing.
Note If you use this method of load-balancing, you can use a device-local EtherChannel as an Individual
interface.
How the ASA Cluster Manages Connections
• Connection Roles, page 1-15
• New Connection Ownership, page 1-16
• Sample Data Flow, page 1-16
• Rebalancing New TCP Connections Across the Cluster, page 1-17
Connection Roles
There are 3 different ASA roles defined for each connection:
• Owner—The unit that initially receives the connection. The owner maintains the TCP state and
processes packets. A connection has only one owner.
• Director—The unit that handles owner lookup requests from forwarders and also maintains the
connection state to serve as a backup if the owner fails. When the owner receives a new connection,
it chooses a director based on a hash of the source/destination IP address and TCP ports, and sends
a message to the director to register the new connection. If packets arrive at any unit other than the
owner, the unit queries the director about which unit is the owner so it can forward the packets. A
connection has only one director.
• Forwarder—A unit that forwards packets to the owner. If a forwarder receives a packet for a
connection it does not own, it queries the director for the owner, and then establishes a flow to the
owner for any other packets it receives for this connection. The director can also be a forwarder.
Note that if a forwarder receives the SYN-ACK packet, it can derive the owner directly from a SYN
cookie in the packet, so it does not need to query the director. (If you disable TCP sequence
randomization, the SYN cookie is not used; a query to the director is required.) For short-lived flows
such as DNS and ICMP, instead of querying, the forwarder immediately sends the packet to the
director, which then sends them to the owner. A connection can have multiple forwarders; the most
efficient throughput is achieved by a good load-balancing method where there are no forwarders and
all packets of a connection are received by the owner.
1-16
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
New Connection Ownership
When a new connection is directed to a member of the cluster via load balancing, that unit owns both
directions of the connection. If any connection packets arrive at a different unit, they are forwarded to
the owner unit over the cluster control link. For best performance, proper external load balancing is
required for both directions of a flow to arrive at the same unit, and for flows to be distributed evenly
between units. If a reverse flow arrives at a different unit, it is redirected back to the original unit. For
more information, see the “Load Balancing Methods” section on page 1-12.
Sample Data Flow
The following example shows the establishment of a new connection.
1. The SYN packet originates from the client and is delivered to an ASA (based on the load balancing
method), which becomes the owner. The owner creates a flow, encodes owner information into a
SYN cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a different ASA (based on the
load balancing method). This ASA is the forwarder.
3. Because the forwarder does not own the connection, it decodes owner information from the SYN
cookie, creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner.
4. The owner sends a state update to the director, and forwards the SYN-ACK to the client.
5. The director receives the state update from the owner, creates a flow to the owner, and records the
TCP state information as well as the owner. The director acts as the backup owner for the
connection.
6. Any subsequent packets delivered to the forwarder will be forwarded to the owner.
7. If packets are delivered to any additional units, it will query the director for the owner and establish
a flow.
8. Any state change for the flow results in a state update from the owner to the director.
Client
SYN/ACK
1. SYN 1. SYN
2. SYN/ACK
4.State
update
3.SYN/ACK
Director
ASA Cluster
Server
Owner
Forwarder
After step 4, all
remaining packets
are forwarded
directly to the owner.
333480
Inside Outside
1-17
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Rebalancing New TCP Connections Across the Cluster
If the load balancing capabilities of the upstream or downstream routers result in unbalanced flow
distribution, you can configure overloaded units to redirect new TCP flows to other units. No existing
flows will be moved to other units.
ASA Features and Clustering
• Unsupported Features, page 1-17
• Centralized Features, page 1-18
• Features Applied to Individual Units, page 1-18
• Dynamic Routing, page 1-19
• NAT, page 1-21
• Syslog and Netflow, page 1-22
• SNMP, page 1-22
• VPN, page 1-22
• FTP, page 1-23
• Cisco TrustSec, page 1-23
Unsupported Features
These features cannot be configured with clustering enabled, and the commands will be rejected.
• Unified Communications
• Remote access VPN (SSL VPN and IPsec VPN)
• The following application inspections:
– CTIQBE
– GTP
– H323, H225, and RAS
– IPsec passthrough
– MGCP
– MMP
– RTSP
– SIP
– SCCP (Skinny)
– WAAS
– WCCP
• Botnet Traffic Filter
• Auto Update Server
• DHCP client, server, relay, and proxy
• VPN load balancing
1-18
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
• Failover
• ASA CX module
Centralized Features
The following features are only supported on the master unit, and are not scaled for the cluster. For
example, you have a cluster of eight units (5585-X with SSP-60). The Other VPN license allows a
maximum of 10,000 site-to-site IPsec tunnels for one ASA 5585-X with SSP-60. For the entire cluster
of eight units, you can only use 10,000 tunnels; the feature does not scale.
Note Traffic for centralized features is forwarded from member units to the master unit over the cluster control
link; see the “Sizing the Cluster Control Link” section on page 1-7 to ensure adequate bandwidth for the
cluster control link.
If you use the rebalancing feature (see the “Rebalancing New TCP Connections Across the Cluster”
section on page 1-17), traffic for centralized features may be rebalanced to non-master units before the
traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the master unit.
For centralized features, if the master unit fails, all connections are dropped, and you have to re-establish
the connections on the new master unit.
• Site-to-site VPN
• The following application inspections:
– DCERPC
– NetBios
– PPTP
– RADIUS
– RSH
– SUNRPC
– TFTP
– XDMCP
• Dynamic routing (Spanned EtherChannel mode only)
• Multicast routing (Individual interface mode only)
• Static route monitoring
• IGMP multicast control plane protocol processing (data plane forwarding is distributed across the
cluster)
• PIM multicast control plane protocol processing (data plane forwarding is distributed across the
cluster)
• Authentication and Authorization for network access. Accounting is decentralized.
• Filtering Services
Features Applied to Individual Units
These features are applied to each ASA unit, instead of the cluster as a whole or to the master unit.
1-19
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
• QoS—The QoS policy is synced across the cluster as part of configuration replication. However, the
policy is enforced on each unit independently. For example, if you configure policing on output, then
the conform rate and conform burst values are enforced on traffic exiting a particular ASA. In a
cluster with 8 units and with traffic evenly distributed, the conform rate actually becomes 8 times
the rate for the cluster.
• Threat detection—Threat detection works on each unit independently; for example, the top statistics
is unit-specific. Port scanning detection, for example, does not work because scanning traffic will
be load-balanced between all units, and one unit will not see all traffic.
• Resource management—Resource management in multiple context mode is enforced separately on
each unit based on local usage.
• IPS module—There is no configuration sync or state sharing between IPS modules. Some IPS
signatures require IPS to keep the state across multiple connections. For example, the port scanning
signature is used when the IPS module detects that someone is opening many connections to one
server but with different ports. In clustering, those connections will be balanced between multiple
ASA devices, each of which has its own IPS module. Because these IPS modules do not share state
information, the cluster may not be able to detect port scanning as a result.
Dynamic Routing
• Dynamic Routing in Spanned EtherChannel Mode, page 1-19
• Dynamic Routing in Individual Interface Mode, page 1-20
Dynamic Routing in Spanned EtherChannel Mode
In Spanned EtherChannel mode, the routing process only runs on the master unit, and routes are learned
through the master unit and replicated to slaves. If a routing packet arrives at a slave, it is redirected to
the master unit.
Figure 1-1 Dynamic Routing in Spanned EtherChannel Mode
285895
Router A
Router B
ASAs
EtherChannel
Load Balancing
Only master ASA uses OSPF
with neighboring routers.
Slave ASAs are invisible.
1-20
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
After the slave members learn the routes from the master unit, each unit makes forwarding decisions
independently.
The OSPF LSA database is not synchronized from the master unit to slave units. If there is a master unit
switchover, the neighboring router will detect a restart; the switchover is not transparent. The OSPF
process picks an IP address as its router ID. Although not required, you can assign a static router ID to
ensure a consistent router ID is used across the cluster.
Dynamic Routing in Individual Interface Mode
In Individual interface mode, each unit runs the routing protocol as a standalone router, and routes are
learned by each unit independently.
Figure 1-2 Dynamic Routing in Individual Interface Mode
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an
ASA. ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID
when talking to external routers.
You must configure a cluster pool for the router ID so that each unit has a separate router ID.
Multicast Routing
• Multicast Routing in Spanned EtherChannel Mode, page 1-20
• Multicast Routing in Individual Interface Mode, page 1-21
Multicast Routing in Spanned EtherChannel Mode
In Spanned EtherChannel mode, the master unit handles all multicast routing packets and data packets
until fast-path forwarding is established. After the connection is established, each slave can forward
multicast data packets.
285896
Router A
Router B
ASAs
ECMP Load BalancingAll ASAs are using OSPF
with neighboring routers
1-21
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
Multicast Routing in Individual Interface Mode
In Individual interface mode, units do not act independently with multicast. All data and routing packets
are processed and forwarded by the master unit, thus avoiding packet replication.
NAT
NAT can impact the overall throughput of the cluster. Inbound and outbound NAT packets can be sent to
different ASAs in the cluster because the load balancing algorithm relies on IP addresses and ports, and
NAT causes inbound and outbound packets to have different IP addresses and/or ports. When a packet
arrives at an ASA that is not the connection owner, it is forwarded over the cluster control link to the
owner, causing large amounts of traffic on the cluster control link.
If you still want to use NAT in clustering, then consider the following guidelines:
• No Proxy ARP—For Individual interfaces, a proxy ARP reply is never sent for mapped addresses.
This prevents the adjacent router from maintaining a peer relationship with an ASA that may no
longer be in the cluster. The upstream router needs a static route or PBR with Object Tracking for
the mapped addresses that points to the Main cluster IP address. This is not an issue for a Spanned
EtherChannel, because there is only one IP address associated with the cluster interface.
• No interface PAT on an Individual interface—Interface PAT is not supported for Individual
interfaces.
• NAT pool address distribution—The master unit evenly pre-distributes addresses across the cluster.
If a member receives a connection and they have no addresses left, the connection is dropped, even
if other members still have addresses available. Make sure to include at least as many NAT addresses
as there are units in the cluster to ensure that each unit receives an address. Use the show nat pool
cluster command to see the address allocations.
• No round-robin—Round-robin for a PAT pool is not supported with clustering.
• Dynamic NAT xlates managed by the master unit—The master unit maintains and replicates the
xlate table to slave units. When a slave unit receives a connection that requires dynamic NAT, and
the xlate is not in the table, it requests the xlate from the master unit. The slave unit owns the
connection.
• Per-session PAT feature—Although not exclusive to clustering, the per-session PAT feature
improves the scalability of PAT and, for clustering, allows each slave unit to own PAT connections;
by contrast, multi-session PAT connections have to be forwarded to and owned by the master unit.
By default, all TCP traffic and UDP DNS traffic use a per-session PAT xlate. For traffic that requires
multi-session PAT, such as H.323, SIP, or Skinny, you can disable per-session PAT. For more
information about per-session PAT, see the “Per-Session PAT vs. Multi-Session PAT” section on
page 1-9 in the firewall configuration guide.
• No static PAT for the following inspections—
– FTP
– PPTP
– RSH
– SQLNET
– TFTP
– XDMCP
– All Voice-over-IP applications
1-22
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Information About ASA Clustering
AAA for Network Access
AAA for network access consists of three components: authentication, authorization, and accounting.
Authentication and accounting are implemented as centralized features on the clustering master with
replication of the data structures to the cluster slaves. If a master is elected, the new master will have all
the information it needs to continue uninterrupted operation of the established authenticated users and
their associated authorizations. Idle and absolute timeouts for user authentications are preserved when a
master unit change occurs.
Accounting is implemented as a distributed feature in a cluster. Accounting is done on a per-flow basis,
so the cluster unit owning a flow will send accounting start and stop messages to the AAA server when
accounting is configured for a flow.
Syslog and Netflow
• Syslog—Each unit in the cluster generates its own syslog messages. You can configure logging so
that each unit uses either the same or a different device ID in the syslog message header field. For
example, the hostname configuration is replicated and shared by all units in the cluster. If you
configure logging to use the hostname as the device ID, syslog messages generated by all units look
as if they come from a single unit. If you configure logging to use the local-unit name that is
assigned in the cluster bootstrap configuration as the device ID, syslog messages look as if they
come from different units. See the “Including the Device ID in Non-EMBLEM Format Syslog
Messages” section on page 1-17.
• NetFlow—Each unit in the cluster generates its own NetFlow stream. The NetFlow collector can
only treat each ASA as a separate NetFlow exporter.
SNMP
An SNMP agent polls each individual ASA by its Local IP address. You cannot poll consolidated data
for the cluster.
You should always use the Local address, and not the Main cluster IP address for SNMP polling. If the
SNMP agent polls the Main cluster IP address, if a new master is elected, the poll to the new master unit
will fail.
VPN
Site-to-site VPN is a centralized feature; only the master unit supports VPN connections.
Note Remote access VPN is not supported with clustering.
VPN functionality is limited to the master unit and does not take advantage of the cluster high
availability capabilities. If the master unit fails, all existing VPN connections are lost, and VPN users
will see a disruption in service. When a new master is elected, you must reestablish the VPN
connections.
When you connect a VPN tunnel to a Spanned EtherChannel address, connections are automatically
forwarded to the master unit. For connections to an Individual interface when using PBR or ECMP, you
must always connect to the Main cluster IP address, not a Local address.
VPN-related keys and certificates are replicated to all units.
1-23
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Licensing Requirements for ASA Clustering
FTP
• If FTP data channel and control channel flows are owned by different cluster members, the data
channel owner will periodically send idle timeout updates to the control channel owner and update
the idle timeout value. However, if the control flow owner is reloaded, and the control flow is
re-hosted, the parent/child flow relationship will not longer be maintained; the control flow idle
timeout will not be updated.
• If you use AAA for FTP access, then the control channel flow is centralized on the master unit.
Cisco TrustSec
Only the master unit learns security group tag (SGT) information. The master unit then populates the
SGT to slaves, and slaves can make a match decision for SGT based on the security policy.
Licensing Requirements for ASA Clustering
Prerequisites for ASA Clustering
Switch Prerequisites
• Be sure to complete the switch configuration before you configure clustering on the ASAs.
• Table 1-2 lists supported external hardware and software to interoperate with ASA clustering.
ASA Prerequisites
• Provide each unit with a unique IP address before you join them to the management network.
– See Chapter 1, “Getting Started,” for more information about connecting to the ASA and setting
the management IP address.
– Except for the IP address used by the master unit (typically the first unit you add to the cluster),
these management IP addresses are for temporary use only.
Model License Requirement
ASA 5580,
ASA 5585-X
Cluster License, supports up to 8 units.
A Cluster license is required on each unit. For other feature licenses, cluster units do not require the
same license on each unit. If you have feature licenses on multiple units, they combine into a single
running ASA cluster license.
Note Each unit must have the same encryption license.
All other models No support.
Table 1-2 External Hardware and Software Dependencies for ASA Clustering
External Hardware External Software ASA Version
Nexus 7000 NXOS 5.2(5) 9.0(1) and later.
Catalyst 6500 with Supervisor 32,
720, and 720-10GE
IOS 12.2(33)SXI7, SXI8, and SXI9 9.0(1) and later.
1-24
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Guidelines and Limitations
– After a slave joins the cluster, its management interface configuration is replaced by the one
replicated from the master unit.
• To use jumbo frames on the cluster control link (recommended), you must enable Jumbo Frame
Reservation before you enable clustering. See the “Enabling Jumbo Frame Support (Supported
Models)” section on page 1-33.
• See also the “ASA Hardware and Software Requirements” section on page 1-3.
Other Prerequisites
We recommend using a terminal server to access all cluster member unit console ports. For initial setup,
and ongoing management (for example, when a unit goes down), a terminal server is useful for remote
management.
Guidelines and Limitations
Context Mode Guidelines
Supported in single and multiple context modes. The mode must match on each member unit.
Firewall Mode Guidelines
Supported in routed and transparent firewall modes. For single mode, the firewall mode must match on
all units.
Failover Guidelines
Failover is not supported with clustering.
IPv6 Guidelines
Supports IPv6. However, the cluster control link is only supported using IPv4.
Model Guidelines
Supported on:
• ASA 5585-X
For the ASA 5585-X with SSP-10 and SSP-20, which includes two Ten Gigabit Ethernet interfaces,
we recommend using one interface for the cluster control link, and the other for data (you can use
subinterfaces for data). Although this setup does not accommodate redundancy for the cluster
control link, it does satisfy the need to size the cluster control link to match the size of the data
interfaces. See the “Sizing the Cluster Control Link” section on page 1-7 for more information.
• ASA 5580
Switch Guidelines
• On the switch(es) for the cluster control link interfaces, you can optionally enable Spanning Tree
PortFast on the switch ports connected to the ASA to speed up the join process for new units.
• When you see slow bundling of a Spanned EtherChannel on the switch, you can enable LACP rate
fast for an Individual interface on the switch.
1-25
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Guidelines and Limitations
• On the switch, we recommend that you use one of the following EtherChannel load-balancing
algorithms: source-dest-ip or source-dest-ip-port (see the Nexus OS and IOS port-channel
load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can
cause unevenly distributed traffic to the ASAs in a cluster. Do not change the load-balancing
algorithm from the default on the ASA (in the port-channel load-balance command).
• If you change the load-balancing algorithm of the EtherChannel on the switch, the EtherChannel
interface on the switch temporarily stops forwarding traffic, and the Spanning Tree Protocol restarts.
There will be a delay before traffic starts flowing again.
EtherChannel Guidelines
• For detailed EtherChannel guidelines, limitations, and prerequisites, see the “Configuring an
EtherChannel” section on page 1-28.
• See also the “EtherChannel Guidelines” section on page 1-11.
• Spanned vs. Device-Local EtherChannel Configuration—Be sure to configure the switch
appropriately for Spanned EtherChannels vs. Device-local EtherChannels.
– Spanned EtherChannels—For ASA Spanned EtherChannels, which span across all members of
the cluster, the interfaces are combined into a single EtherChannel on the switch. Make sure
each interface is in the same channel group on the switch.
VLAN 101
port-ch1
RIGHT WRONG
port-ch2
port-ch3
port-ch4
ASA1
Switch Switch
ASA2
ASA3
ASA4
ten0/6
VLAN 101
port-ch1
Spanned Data Ifc
port-ch1
ten0/6
ten0/6
ten0/6
ASA1
ASA2
ASA3
ASA4
ten0/6
Spanned Data Ifc
port-ch1
ten0/6
ten0/6
ten0/6
334621
1-26
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Guidelines and Limitations
– Device-local EtherChannels—For ASA Device-local EtherChannels including any
EtherChannels configured for the cluster control link, be sure to configure discrete
EtherChannels on the switch; do not combine multiple ASA EtherChannels into one
EtherChannel on the switch.
Additional Guidelines
• See the “ASA Hardware and Software Requirements” section on page 1-3.
• For unsupported features with clustering, see the “Unsupported Features” section on page 1-17.
• When significant topology changes occur (such as adding or removing an EtherChannel interface,
enabling or disabling an interface on the ASA or the switch, adding an additional switch to form a
VSS or vPC) you should disable the health check feature. When the topology change is complete,
and the configuration change is synced to all units, you can re-enable the health check feature.
• When adding a unit to an existing cluster, or when reloading a unit, there will be a temporary, limited
packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang your
connection; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP
client hang. In this case, you need to reestablish the FTP connection.
• If you use a Windows 2003 server connected to a Spanned EtherChannel, when the syslog server
port is down and the server does not throttle ICMP error messages, then large numbers of ICMP
messages are sent back to the ASA cluster. These messages can result in some units of the ASA
cluster experiencing high CPU, which can affect performance. We recommend that you throttle
ICMP error messages.
ASA1
ASA2
ASA3
ASA4
ten0/6
Cluster Control Link
port-ch1
ten0/7
port-ch1
port-ch1
port-ch1
VLAN 101
port-ch1
RIGHT WRONG
port-ch2
port-ch3
port-ch4
ten0/6
ten0/7
ten0/6
ten0/7
ten0/6
ten0/7
ASA1
ASA2
ASA3
ASA4
ten0/6
Cluster Control Link
port-ch1
ten0/7
port-ch1
port-ch1
port-ch1
VLAN 101
port-ch1
ten0/6
ten0/7
ten0/6
ten0/7
ten0/6
ten0/7
333358
Switch Switch
1-27
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Default Settings
Default Settings
• When using Spanned EtherChannels, the cLACP system ID is auto-generated and the system
priority is 1 by default.
• The cluster health check feature is enabled by default with the holdtime of 3 seconds.
• Connection rebalancing is disabled by default. If you enable connection rebalancing, the default
time between load information exchanges is 5 seconds.
Configuring ASA Clustering
Note To enable or disable clustering, you must use a console connection (for CLI) or an ASDM connection.
• Task Flow for ASA Cluster Configuration, page 1-27
• Cabling the Cluster Units and Configuring Upstream and Downstream Equipment, page 1-28
• Configuring the Cluster Interface Mode on Each Unit, page 1-30
• Configuring Interfaces on the Master Unit, page 1-31
• Configuring the Master Unit Bootstrap Settings, page 1-37
• Configuring Slave Unit Bootstrap Settings, page 1-43
Task Flow for ASA Cluster Configuration
To configure clustering, perform the following steps:
Step 1 Complete all pre-configuration on the switches and ASAs according to the “Prerequisites for ASA
Clustering” section on page 1-23.
Step 2 Cable your equipment. Before configuring clustering, cable the cluster control link network,
management network, and data networks. See the “Cabling the Cluster Units and Configuring Upstream
and Downstream Equipment” section on page 1-28.
Step 3 Configure the interface mode. You can only configure one type of interface for clustering: Spanned
EtherChannels or Individual interfaces. See the “Configuring the Cluster Interface Mode on Each Unit”
section on page 1-30.
Step 4 Configure interfaces for clustering on the master unit. You cannot enable clustering if the interfaces are
not cluster-ready. See the “Configuring Interfaces on the Master Unit” section on page 1-31.
Step 5 Configure the bootstrap settings and enable clustering on the master unit. See the “Configuring the
Master Unit Bootstrap Settings” section on page 1-37.
Step 6 Configure the bootstrap settings for each slave unit. See the “Configuring Slave Unit Bootstrap Settings”
section on page 1-43.
Step 7 Configure the security policy on the master unit. See the chapters in this guide to configure supported
features on the master unit. The configuration is replicated to the slave units. For a list of supported and
unsupported features, see the “ASA Features and Clustering” section on page 1-17.
1-28
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Cabling the Cluster Units and Configuring Upstream and Downstream
Equipment
Before configuring clustering, cable the cluster control link network, management network, and data
networks.
Note At a minimum, an active cluster control link network is required before you configure the units to join
the cluster.
You should also configure the upstream and downstream equipment. For example, if you use
EtherChannels, then you should configure the upstream and downstream equipment for the
EtherChannels.
Examples
Note This example uses EtherChannels for load-balancing. If you are using PBR or ECMP, your switch
configuration will differ.
For example on each of 4 ASA 5585-Xs, you want to use:
• 2 Ten Gigabit Ethernet interfaces in a device-local EtherChannel for the cluster control link.
• 2 Ten Gigabit Ethernet interfaces in a Spanned EtherChannel for the inside and outside network;
each interface is a VLAN subinterface of the EtherChannel. Using subinterfaces lets both inside and
outside interfaces take advantage of the benefits of an EtherChannel.
• 1 Management interface.
You have one switch for both the inside and outside networks.
1-29
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Purpose Connect Interfaces on each of 4 ASAs To Switch Ports
Cluster control link TenGigabitEthernet 0/6 and
TenGigabitEthernet 0/7
8 ports total
For each TenGigabitEthernet 0/6
and TenGigabitEthernet 0/7 pair,
configure 4 EtherChannels (1 EC
for each ASA).
These EtherChannels must all be
on the same isolated cluster
control VLAN, for example
VLAN 101.
Inside and outside interfaces TenGigabitEthernet 0/8 and
TenGigabitEthernet 0/9
8 ports total
Configure a single EtherChannel
(across all ASAs).
On the switch, configure these
VLANs and networks now; for
example, a trunk including
VLAN 200 for the inside and
VLAN 201 for the outside.
Management interface Management 0/0 4 ports total
Place all interfaces on the same
isolated management VLAN, for
example VLAN 100.
ASA1
333150
ten0/6
ten0/7
ten0/8
man0/0
ten0/9
ASA2
ten0/6
ten0/7
ten0/8
man0/0
ten0/9
ASA3
ten0/6
ten0/7
ten0/8
man0/0
ten0/9
ASA4
ten0/6
ten0/7
ten0/8
man0/0
ten0/9
Switch
Management
VLAN 100
VLAN 101
port-ch1
port-ch2 port-ch3 port-ch4
Cluster
Control Link
port-ch1
port-ch5
Inside VLAN 200
Outside VLAN 201
Trunk
port-ch1 port-ch1 port-ch1
port-ch2
port-ch2.200 Inside VLAN 200
port-ch2.201 Outside VLAN 201
1-30
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
Configure the cluster interface mode on each unit. See the “Configuring the Cluster Interface Mode on
Each Unit” section on page 1-30.
Configuring the Cluster Interface Mode on Each Unit
You can only configure one type of interface for clustering: Spanned EtherChannels or Individual
interfaces; you cannot mix interface types in a cluster. For exceptions for the management interface and
other guidelines, see the “Interface Type Mode” section on page 1-6.
Prerequisites
• You must set the mode separately on each ASA that you want to add to the cluster.
• Transparent firewall mode supports only Spanned EtherChannel mode.
• For multiple context mode, configure this setting in the system execution space; you cannot
configure the mode per context.
Detailed Steps
Command Purpose
Step 1 cluster interface-mode {individual |
spanned} check-details
Example:
hostname(config)# cluster interface-mode
spanned check-details
The check-details command shows any incompatible
configuration so you can force the interface mode and fix your
configuration later; the mode is not changed with this command.
Step 2 cluster interface-mode {individual |
spanned} force
Example:
hostname(config)# cluster interface-mode
spanned force
Sets the interface mode for clustering. There is no default setting;
you must explicitly choose the mode. If you have not set the
mode, you cannot enable clustering.
The force option changes the mode without checking your
configuration for incompatible settings. You need to manually fix
any configuration issues after you change the mode. Because any
interface configuration can only be fixed after you set the mode,
we recommend using the force option so you can at least start
from the existing configuration. You can re-run the check-details
option after you set the mode for more guidance.
Without the force option, if there is any incompatible
configuration, you are prompted to clear your configuration and
reload, thus requiring you to connect to the console port to
reconfigure your management access. If your configuration is
compatible (rare), the mode is changed and the configuration is
preserved. If you do not want to clear your configuration, you can
exit the command by typing n.
To remove the interface mode, enter the no cluster
interface-mode command.
1-31
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
Configure interfaces. See the “Configuring Interfaces on the Master Unit” section on page 1-31.
Configuring Interfaces on the Master Unit
You must modify any interface that is currently configured with an IP address to be cluster-ready before
you enable clustering. For other interfaces, you can configure them before or after you enable clustering;
we recommend pre-configuring all of your interfaces so that the complete configuration is synced to new
cluster members.
This section describes how to configure interfaces to be compatible with clustering. You can configure
data interfaces as either Spanned EtherChannels or as Individual interfaces. Each method uses a different
load-balancing mechanism. You cannot configure both types in the same configuration, with the
exception of the management interface, which can be an Individual interface even in Spanned
EtherChannel mode. For more information, see the “ASA Cluster Interfaces” section on page 1-4.
• Configuring Individual Interfaces (Recommended for the Management Interface), page 1-31
• Configuring Spanned EtherChannels, page 1-33
Configuring Individual Interfaces (Recommended for the Management Interface)
Individual interfaces are normal routed interfaces, each with their own IP address taken from a pool of
IP addresses. The Main cluster IP address is a fixed address for the cluster that always belongs to the
current master unit.
In Spanned EtherChannel mode, we recommend configuring the management interface as an Individual
interface. Individual management interfaces let you connect directly to each unit if necessary, while a
Spanned EtherChannel interface only allows connection to the current master unit. See the “Management
Interface” section on page 1-10 for more information.
Prerequisites
• Except for the management-only interface, you must be in Individual interface mode; see the
“Configuring the Cluster Interface Mode on Each Unit” section on page 1-30.
• For multiple context mode, perform this procedure in each context. If you are not already in the
context configuration mode, enter the changeto context name command.
• Individual interfaces require you to configure load balancing on neighbor devices. External load
balancing is not required for the management interface. For information about load balancing, see
the “Load Balancing Methods” section on page 1-12.
• (Optional) Configure the interface as a device-local EtherChannel interface, a redundant interface,
and/or configure subinterfaces.
– For an EtherChannel, see the “Configuring an EtherChannel” section on page 1-28. This
EtherChannel is local to the unit, and is not a Spanned EtherChannel.
– For a redundant interface, see the “Configuring a Redundant Interface” section on page 1-26.
Management-only interfaces cannot be redundant interfaces.
– For subinterfaces, see the “Configuring VLAN Subinterfaces and 802.1Q Trunking” section on
page 1-31.
1-32
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Detailed Steps
Command Purpose
Step 1 (IPv4)
ip local pool poolname
first-address—last-address [mask mask]
(IPv6)
ipv6 local pool poolname
ipv6-address/prefix-length
number_of_addresses
Example:
hostname(config)# ip local pool ins
192.168.1.2-192.168.1.9
hostname(config-if)# ipv6 local pool
insipv6 2001:DB8::1002/32 8
Configures a pool of Local IP addresses (IPv4 and/or IPv6), one
of which will be assigned to each cluster unit for the interface.
Include at least as many addresses as there are units in the cluster.
If you plan to expand the cluster, include additional addresses.
The Main cluster IP address that belongs to the current master unit
is not a part of this pool; be sure to reserve an IP address on the
same network for the Main cluster IP address.
You cannot determine the exact Local address assigned to each
unit in advance; to see the address used on each unit, enter the
show ip[v6] local pool poolname command. Each cluster member
is assigned a member ID when it joins the cluster. The ID
determines the Local IP used from the pool.
Step 2 interface interface_id
Example:
hostname(config)# interface
tengigabitethernet 0/8
Enters interface configuration mode.
Step 3 (Management interface only)
management-only
Example:
hostname(config-if)# management-only
Sets an interface to management-only mode so that it does not
pass through traffic.
By default, Management type interfaces are configured as
management-only. In transparent mode, this command is always
enabled for a Management type interface.
This setting is required if the cluster interface mode is Spanned.
Step 4 nameif name
Example:
hostname(config-if)# nameif inside
Names the interface.
The name is a text string up to 48 characters, and is not
case-sensitive. You can change the name by reentering this
command with a new value.
Step 5 (IPv4)
ip address ip_address [mask] cluster-pool
poolname
(IPv6)
ipv6 address ipv6-address/prefix-length
cluster-pool poolname
Example:
hostname(config-if)# ip address
192.168.1.1 255.255.255.0 cluster-pool ins
hostname(config-if)# ipv6 address
2001:DB8::1002/32 cluster-pool insipv6
Sets the Main cluster IP address and identifies the cluster pool.
This IP address must be on the same network as the cluster pool
addresses, but not be part of the pool. You can configure an IPv4
and/or an IPv6 address.
DHCP, PPPoE, and IPv6 autoconfiguration are not supported; you
must manually configure the IP addresses.
1-33
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Examples
The following example configures the Management 0/0 and Management 0/1 interfaces as a device-local
EtherChannel, and then configures the EtherChannel as an Individual interface:
ip local pool mgmt 10.1.1.2-10.1.1.9
ipv6 local pool mgmtipv6 2001:DB8:45:1002/64 8
interface management 0/0
channel-group 1 mode active
no shutdown
interface management 0/1
channel-group 1 mode active
no shutdown
interface port-channel 1
nameif management
ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt
ipv6 address 2001:DB8:45:1001/64 cluster-pool mgmtipv6
security-level 100
management-only
What to Do Next
• For spanned interface mode, configure your data interfaces. See the “Configuring Spanned
EtherChannels” section on page 1-33.
• For Individual interface mode, join the cluster. See the “Configuring the Cluster Interface Mode on
Each Unit” section on page 1-30.
Configuring Spanned EtherChannels
A Spanned EtherChannel spans all ASAs in the cluster, and provides load balancing as part of the
EtherChannel operation.
Prerequisites
• You must be in Spanned EtherChannel interface mode; see the “Configuring the Cluster Interface
Mode on Each Unit” section on page 1-30.
• For multiple context mode, start this procedure in the system execution space. If you are not already
in the System configuration mode, enter the changeto system command.
Step 6 security-level number
Example:
hostname(config-if)# security-level 100
Sets the security level, where number is an integer between 0
(lowest) and 100 (highest). See the “Security Levels” section on
page 1-1.
Step 7 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface.
Command Purpose
1-34
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
• For transparent mode, configure the bridge group according to the “Configuring Bridge Groups”
section on page 1-8.
Guidelines
• Do not specify the maximum and minimum links in the EtherChannel—We recommend that you do
not specify the maximum and minimum links in the EtherChannel (The lacp max-bundle and
port-channel min-bundle commands) on either the ASA or the switch. If you need to use them,
note the following:
– The maximum links set on the ASA is the total number of active ports for the whole cluster. Be
sure the maximum links value configured on the switch is not larger than the ASA value.
– The minimum links set on the ASA is the minimum active ports to bring up a port-channel
interface per unit. On the switch, the minimum links is the minimum links across the cluster, so
this value will not match the ASA value.
• Do not change the load-balancing algorithm from the default (see the port-channel load-balance
command). On the switch, we recommend that you use one of the following algorithms:
source-dest-ip or source-dest-ip-port (see the Nexus OS and IOS port-channel load-balance
command). Do not use a vlan keyword in the load-balance algorithm because it can cause unevenly
distributed traffic to the ASAs in a cluster.
• The lacp port-priority and lacp system-priority commands are not used for a Spanned
EtherChannel.
• When using Spanned EtherChannels, the port-channel interface will not come up until clustering is
fully enabled (see the “Configuring Spanned EtherChannels” section on page 1-33). This
requirement prevents traffic from being forwarded to a unit that is not an active unit in the cluster.
• For detailed EtherChannel guidelines, limitations, and prerequisites, see the “Configuring an
EtherChannel” section on page 1-28.
• See also the “EtherChannel Guidelines” section on page 1-11.
1-35
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Detailed Steps
Command Purpose
Step 1 interface physical_interface
Example:
hostname(config)# interface
gigabitethernet 0/0
Specifies the interface you want to add to the channel group,
where the physical_interface ID includes the type, slot, and port
number as type slot/port. This first interface in the channel group
determines the type and speed for all other interfaces in the group.
Step 2 channel-group channel_id mode active
[vss-id {1 | 2}]
Example:
hostname(config-if)# channel-group 1 mode
active
Assigns this interface to an EtherChannel with the channel_id
between 1 and 48. If the port-channel interface for this channel ID
does not yet exist in the configuration, one will be added
automatically:
interface port-channel channel_id
Only active mode is supported for Spanned EtherChannels.
If you are connecting the ASA to two switches in a VSS or vPC,
then configure the vss-id keyword to identify to which switch this
interface is connected (1 or 2). You must also use the
port-channel span-cluster vss-load-balance command for the
port-channel interface in Step 6. See also the “Connecting to a
VSS or vPC” section on page 1-13 for more information.
Step 3 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface.
Step 4 (Optional) Add additional interfaces to the
EtherChannel by repeating Step 1 through
Step 3.
Example:
hostname(config)# interface
gigabitethernet 0/1
hostname(config-if)# channel-group 1 mode
active
hostname(config-if)# no shutdown
Multiple interfaces in the EtherChannel per unit are useful for
connecting to switches in a VSS or vPC. Keep in mind that an
EtherChannel, can have only 8 active interfaces out of 16
maximum; the remaining 8 interfaces are on standby in case of
link failure. For example, for a cluster of 8 ASAs, you can use a
maximum of 2 interfaces on each ASA, for a total of 16 interfaces
in the EtherChannel.
Step 5 interface port-channel channel_id
Example:
hostname(config)# interface port-channel 1
Specifies the port-channel interface. This interface was created
automatically when you added an interface to the channel group.
Step 6 port-channel span-cluster
[vss-load-balance]
Example:
hostname(config-if)# port-channel
span-cluster
Sets this EtherChannel as a Spanned EtherChannel.
If you are connecting the ASA to two switches in a VSS or vPC,
then you should enable VSS load balancing by using the
vss-load-balance keyword. This feature ensures that the physical
link connections between the ASAs to the VSS (or vPC) pair are
balanced. You must configure the vss-id keyword in the
channel-group command for each member interface before
enabling load balancing (see Step 2).
1-36
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Step 7 (Optional)
You can set the Ethernet properties for the
port-channel interface to override the properties
set on the Individual interfaces.
This method provides a shortcut to set these parameters because
these parameters must match for all interfaces in the channel
group. See the “Enabling the Physical Interface and Configuring
Ethernet Parameters” section on page 1-23 for Ethernet
commands.
Step 8 (Optional)
If you are creating VLAN subinterfaces on this
EtherChannel, do so now. The rest of this
procedure applies to the subinterfaces.
Example:
hostname(config)# interface port-channel
1.10
hostname(config-if)# vlan 10
See the “Configuring VLAN Subinterfaces and 802.1Q Trunking”
section on page 1-31.
Step 9 (Multiple Context Mode)
Allocate the interface to a context. See the
“Configuring a Security Context” section on
page 1-19.
Then enter:
changeto context name
interface port-channel channel_id
Example:
hostname(config)# context admin
hostname(config)# allocate-interface
port-channel1
hostname(config)# changeto context admin
hostname(config-if)# interface
port-channel 1
For multiple context mode, the rest of the interface configuration
occurs within each context.
Step 10 nameif name
Example:
hostname(config-if)# nameif inside
Names the interface.
The name is a text string up to 48 characters, and is not
case-sensitive. You can change the name by reentering this
command with a new value.
Step 11 Perform one of the following, depending on the firewall mode:
Routed Mode:
(IPv4)
ip address ip_address [mask]
(IPv6)
ipv6 address ipv6-prefix/prefix-length
Example:
hostname(config-if)# ip address 10.1.1.1
255.255.255.0
hostname(config-if)# ipv6 address
2001:DB8::1001/32
Sets the IPv4 and/or IPv6 address. DHCP, PPPoE, and IPv6
autoconfig are not supported.
Command Purpose
1-37
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
Configure the master unit bootstrap settings. See the “Configuring the Master Unit Bootstrap Settings”
section on page 1-37.
Configuring the Master Unit Bootstrap Settings
Each unit in the cluster requires a bootstrap configuration to join the cluster. Typically, the first unit you
configure to join the cluster will be the master unit. After you enable clustering, after an election period,
the cluster elects a master unit. With only one unit in the cluster initially, that unit will become the master
unit. Subsequent units that you add to the cluster will be slave units.
• Prerequisites, page 1-38
• Enabling the Cluster Control Link Interface, page 1-38
• Configuring Basic Bootstrap Settings and Enabling Clustering, page 1-40
• Configuring Advanced Clustering Settings, page 1-42
• Examples, page 1-43
Transparent Mode:
bridge-group number
Example:
hostname(config-if)# bridge-group 1
Assigns the interface to a bridge group, where number is an
integer between 1 and 100. You can assign up to four interfaces to
a bridge group. You cannot assign the same interface to more than
one bridge group. Note that the BVI configuration includes the
IP address.
Step 12 security-level number
Example:
hostname(config-if)# security-level 50
Sets the security level, where number is an integer between 0
(lowest) and 100 (highest). See the “Security Levels” section on
page 1-1.
Step 13 mac-address mac_address
Example:
hostname(config-if)# mac-address
000C.F142.4CDE
You must configure a MAC address for a Spanned EtherChannel
so that the MAC address does not change when the current master
unit leaves the cluster; with a manually-configured MAC address,
the MAC address stays with the current master unit.
In multiple context mode, if you share an interface between
contexts, auto-generation of MAC addresses is enabled by
default, so you only need to set the MAC address manually for a
shared interface if you disable auto-generation. Note that you
must manually configure the MAC address for non-shared
interfaces.
The mac_address is in H.H.H format, where H is a 16-bit
hexadecimal digit. For example, the MAC address
00-0C-F1-42-4C-DE is entered as 000C.F142.4CDE.
The first two bytes of a manual MAC address cannot be A2 if you
also want to use auto-generated MAC addresses.
Command Purpose
1-38
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Prerequisites
• You must use the console port to enable or disable clustering. You cannot use Telnet or SSH.
• Back up your configurations in case you later want to leave the cluster, and need to restore your
configuration.
• For multiple context mode, complete these procedures in the system execution space. To change
from the context to the system execution space, enter the changeto system command.
• We recommend enabling jumbo frame reservation for use with the cluster control link. See the
“Enabling Jumbo Frame Support (Supported Models)” section on page 1-33.
• With the exception of the cluster control link, any interfaces in your configuration must be
configured with a cluster IP pool or as a Spanned EtherChannel before you enable clustering,
depending on your interface mode. If you have pre-existing interface configuration, you can either
clear the interface configuration (clear configure interface), or convert your interfaces to cluster
interfaces according to the “Configuring Interfaces on the Master Unit” section on page 1-31 before
you enable clustering.
• When you add a unit to a running cluster, you may see temporary, limited packet/connection drops;
this is expected behavior.
Enabling the Cluster Control Link Interface
You need to enable the cluster control link interface before you join the cluster. You will later identify
this interface as the cluster control link when you enable clustering.
We recommend that you combine multiple cluster control link interfaces into an EtherChannel if you
have enough interfaces. The EtherChannel is local to the ASA, and is not a Spanned EtherChannel.
The cluster control link interface configuration is not replicated from the master unit to slave units;
however, you must use the same configuration on each unit. Because this configuration is not replicated,
you must configure the cluster control link interfaces separately on each unit.
Prerequisites
Determine the size of the cluster control link by referring to the “Sizing the Cluster Control Link” section
on page 1-7.
Restrictions
• You cannot use a VLAN subinterface as the cluster control link.
• You cannot use a Management x/x interface as the cluster control link, either alone or as an
EtherChannel.
• For the ASA 5585-X with an ASA IPS or ASA CX module, you cannot use the module interfaces
for the cluster control link.
1-39
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Detailed Steps—Single Interface
Detailed Steps—EtherChannel Interface
Command Purpose
Step 1 interface interface_id
Example:
hostname(config)# interface
tengigabitethernet 0/6
Enters interface configuration mode.
Step 2 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface. You only need to enable the interface; do
not configure a name for the interface, or any other parameters.
Command Purpose
Step 1 interface interface_id
Example:
hostname(config)# interface
tengigabitethernet 0/6
Enters interface configuration mode.
Step 2 channel-group channel_id mode on
Example:
hostname(config-if)# channel-group 1 mode
on
Assigns this physical interface to an EtherChannel with the
channel_id between 1 and 48. If the port-channel interface for this
channel ID does not yet exist in the configuration, one will be
added automatically:
interface port-channel channel_id
We recommend using the On mode for cluster control link
member interfaces to reduce unnecessary traffic on the cluster
control link. The cluster control link does not need the overhead
of LACP traffic because it is an isolated, stable network. Note: We
recommend setting data EtherChannels to Active mode.
Step 3 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface.
Step 4 interface interface_id
channel-group channel_id mode on
no shutdown
Example:
hostname(config)# interface
tengigabitethernet 0/7
hostname(config-if)# channel-group 1 mode
on
hostname(config-if)# no shutdown
Repeat for each additional interface you want to add to the
EtherChannel.
1-40
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
Configure the master unit bootstrap settings. See the Configuring Basic Bootstrap Settings and Enabling
Clustering, page 1-40.
Configuring Basic Bootstrap Settings and Enabling Clustering
Perform the following steps to configure basic bootstrap settings and to enable clustering.
Detailed Steps
Command Purpose
Step 1 (Optional)
mtu cluster bytes
Example:
hostname(config)# mtu cluster 9000
Specifies the maximum transmission unit for the cluster control
link interface, between 64 and 65,535 bytes. The default MTU is
1500 bytes.
Note We suggest setting the MTU to 1600 bytes or greater,
which requires you to enable jumbo frame reservation
before continuing with this procedure. See the “Enabling
Jumbo Frame Support (Supported Models)” section on
page 1-33. Jumbo frame reservation requires a reload of
the ASA.
This command is a global configuration command, but is also part
of the bootstrap configuration that is not replicated between units.
Step 2 cluster group name
Example:
hostname(config)# cluster group pod1
Names the cluster and enters cluster configuration mode. The
name must be an ASCII string from 1 to 38 characters. You can
only configure one cluster group per unit. All members of the
cluster must use the same name.
Step 3 local-unit unit_name
Example:
hostname(cfg-cluster)# local-unit unit1
Names this member of the cluster with a unique ASCII string from
1 to 38 characters. Each unit must have a unique name. A unit with
a duplicated name will be not be allowed in the cluster.
Step 4 cluster-interface interface_id ip
ip_address mask
Example:
hostname(cfg-cluster)# cluster-interface
port-channel2 ip 192.168.1.1 255.255.255.0
INFO: Non-cluster interface config is
cleared on Port-Channel2
Specifies the cluster control link interface, preferably an
EtherChannel. Subinterfaces and Management interfaces are not
allowed. See the “Configuring Interfaces on the Master Unit”
section on page 1-31
Specify an IPv4 address for the IP address; IPv6 is not supported
for this interface. This interface cannot have a nameif configured.
For each unit, specify a different IP address on the same network.
Step 5 priority priority_number
Example:
hostname(cfg-cluster)# priority 1
Sets the priority of this unit for master unit elections, between 1
and 100, where 1 is the highest priority. See the “Master Unit
Election” section on page 1-3 for more information.
1-41
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Step 6 (Optional)
key shared_secret
Example:
hostname(cfg-cluster)# key
chuntheunavoidable
Sets an authentication key for control traffic on the cluster control
link. The shared secret is an ASCII string from 1 to 63 characters.
The shared secret is used to generate the key. This command does
not affect datapath traffic, including connection state update and
forwarded packets, which are always sent in the clear.
Step 7 (Optional)
clacp system-mac {mac_address | auto}
[system-priority number]
Example:
hostname(cfg-cluster)# clacp system-mac
000a.0000.aaaa
When using Spanned EtherChannels, the ASA uses cLACP to
negotiate the EtherChannel with the neighbor switch. ASAs in a
cluster collaborate in cLACP negotiation so that they appear as a
single (virtual) device to the switch. One parameter in cLACP
negotiation is a system ID, which is in the format of a MAC
address. All ASAs in the cluster use the same system ID:
auto-generated by the master unit (the default) and replicated to
all slaves; or manually specified in this command in the form
H.H.H, where H is a 16-bit hexadecimal digit. (For example, the
MAC address 00-0A-00-00-AA-AA is entered as
000A.0000.AAAA.) You might want to manually configure the
MAC address for troubleshooting purposes, for example, so you
can use an easily identified MAC address. Typically, you would
use the auto-generated MAC address.
The system priority, between 1 and 65535, is used to decide which
unit is in charge of making a bundling decision. By default, the
ASA uses priority 1, which is the highest priority. The priority
needs to be higher than the priority on the switch.
This command is not part of the bootstrap configuration, and is
replicated from the master unit to the slave units. However, you
cannot change this value after you enable clustering.
Step 8 enable [noconfirm]
Example:
hostname(cfg-cluster)# enable
INFO: Clustering is not compatible with
following commands:
policy-map global_policy
class inspection_default
inspect skinny
policy-map global_policy
class inspection_default
inspect sip
Would you like to remove these commands?
[Y]es/[N]o:Y
INFO: Removing incompatible commands from
running configuration...
Cryptochecksum (changed): f16b7fc2
a742727e e40bc0b0 cd169999
INFO: Done
Enables clustering. When you enter the enable command, the
ASA scans the running configuration for incompatible commands
for features that are not supported with clustering, including
commands that may be present in the default configuration. You
are prompted to delete the incompatible commands. If you
respond No, then clustering is not enabled. Use the noconfirm
keyword to bypass the confirmation and delete incompatible
commands automatically.
For the first unit enabled, a master unit election occurs. Because
the first unit should be the only member of the cluster so far, it will
become the master unit. Do not perform any configuration
changes during this period.
To disable clustering, enter the no enable command.
Note If you disable clustering, all data interfaces are shut down,
and only the management-only interface is active. If you
want to remove the unit from the cluster entirely (and thus
want to have active data interfaces), see the “Leaving the
Cluster” section on page 1-49.
Command Purpose
1-42
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
• Configure advanced settings. See the “Configuring Advanced Clustering Settings” section on
page 1-42.
• Add slave units. See the “Configuring Slave Unit Bootstrap Settings” section on page 1-43.
Configuring Advanced Clustering Settings
Perform the following steps to customize your clustering configuration.
Detailed Steps
Command Purpose
Step 1 health-check [holdtime timeout]
Example:
hostname(cfg-cluster)# health-check
holdtime 5
Customizes the cluster health check feature, which includes unit
health monitoring and interface health monitoring. The holdime
determines the amount of time between keepalive or interface
status messages, between .8 and 45 seconds. The default is 3
seconds.
To determine unit health, the ASA cluster units send keepalive
messages on the cluster control link to other units. If a unit does
not receive any keepalive messages from a peer unit within the
holdtime period, the peer unit is considered unresponsive or dead.
Interface status messages detect link failure. If an interface fails
on a particular unit, but the same interface is active on other units,
then the unit is removed from the cluster. If a unit does not receive
interface status messages within the holdtime, then the amount of
time before the ASA removes a member from the cluster depends
on the type of interface and whether the unit is an established
member or is joining the cluster. For EtherChannels (spanned or
not), if the interface is down on an established member, then the
ASA removes the member after 9 seconds. If the unit is joining the
cluster as a new member, the ASA waits 45 seconds before
rejecting the new unit. For non-EtherChannels, the unit is
removed after 500 ms, regardless of the member state.
Health check is enabled by default. You can disable it using the no
form of this command.
Note When any topology changes occur (such as adding or
removing a data interface, enabling or disabling an
interface on the ASA or the switch, or adding an
additional switch to form a VSS or vPC) you should
disable the health check feature. When the topology
change is complete, and the configuration change is
synced to all units, you can re-enable the health check
feature.
1-43
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
What to Do Next
Add slave units. See the “Configuring Slave Unit Bootstrap Settings” section on page 1-43.
Examples
The following example configures a management interface, configures a device-local EtherChannel for
the cluster control link, and then enables clustering for the ASA called “unit1,” which will become the
master unit because it is added to the cluster first:
ip local pool mgmt 10.1.1.2-10.1.1.9
ipv6 local pool mgmtipv6 2001:DB8::1002/32 8
interface management 0/0
nameif management
ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt
ipv6 address 2001:DB8::1001/32 cluster-pool mgmtipv6
security-level 100
management-only
no shutdown
interface tengigabitethernet 0/6
channel-group 1 mode on
no shutdown
interface tengigabitethernet 0/7
channel-group 1 mode on
no shutdown
cluster group pod1
local-unit unit1
cluster-interface port-channel1 ip 192.168.1.1 255.255.255.0
priority 1
key chuntheunavoidable
enable noconfirm
Configuring Slave Unit Bootstrap Settings
Perform the following procedures to configure the slave units.
Step 2 conn-rebalance [frequency seconds]
Example:
hostname(cfg-cluster)# conn-rebalance
frequency 60
Enables connection rebalancing for TCP traffic. This command is
disabled by default. If enabled, ASAs exchange load information
periodically, and offload new connections from more loaded
devices to less loaded devices. The frequency, between 1 and 360
seconds, specifies how often the load information is exchanged.
The default is 5 seconds.
Step 3 console-replicate
Example:
hostname(cfg-cluster)# console-replicate
Enables console replication from slave units to the master unit.
This feature is disabled by default. The ASA prints out some
messages directly to the console for certain critical events. If you
enable console replication, slave units send the console messages
to the master unit so you only need to monitor one console port
for the cluster.
Command Purpose
1-44
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
• Prerequisites, page 1-44
• Enabling the Cluster Control Link Interface, page 1-44
• Configuring Bootstrap Settings and Joining the Cluster, page 1-45
• Examples, page 1-47
Prerequisites
• You must use the console port to enable or disable clustering. You cannot use Telnet or SSH.
• Back up your configurations in case you later want to leave the cluster, and need to restore your
configuration.
• For multiple context mode, complete this procedure in the system execution space. To change from
the context to the system execution space, enter the changeto system command.
• We recommend enabling jumbo frame reservation for use with the cluster control link. See the
“Enabling Jumbo Frame Support (Supported Models)” section on page 1-33.
• If you have any interfaces in your configuration that have not been configured for clustering (for
example, the default configuration Management 0/0 interface), you can join the cluster as a slave
unit (with no possibility of becoming the master in a current election).
• When you add a unit to a running cluster, you may see temporary, limited packet/connection drops;
this is expected behavior.
Enabling the Cluster Control Link Interface
Configure the same cluster control link interface as you configured for the master unit. See the “Enabling
the Cluster Control Link Interface” section on page 1-38.
Detailed Steps—Single Interface
Command Purpose
Step 1 interface interface_id
Example:
hostname(config)# interface
tengigabitethernet 0/6
Enters interface configuration mode.
Step 2 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface. You only need to enable the interface; do
not configure a name for the interface, or any other parameters.
1-45
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Detailed Steps—EtherChannel Interface
What to Do Next
Configure the slave unit bootstrap settings. See the Configuring Bootstrap Settings and Joining the
Cluster, page 1-45.
Configuring Bootstrap Settings and Joining the Cluster
Perform the following steps to configure bootstrap settings and join the cluster as a slave unit.
Command Purpose
Step 1 interface interface_id
Example:
hostname(config)# interface
tengigabitethernet 0/6
Enters interface configuration mode.
Step 2 channel-group channel_id mode on
Example:
hostname(config-if)# channel-group 1 mode
on
Assigns this physical interface to an EtherChannel with the
channel_id between 1 and 48. If the port-channel interface for this
channel ID does not yet exist in the configuration, one will be
added automatically:
interface port-channel channel_id
We recommend using the On mode for cluster control link
member interfaces to reduce unnecessary traffic on the cluster
control link. The cluster control link does not need the overhead
of LACP traffic because it is an isolated, stable network. Note: We
recommend setting data EtherChannels to Active mode.
Step 3 no shutdown
Example:
hostname(config-if)# no shutdown
Enables the interface.
Step 4 interface interface_id
channel-group channel_id mode on
no shutdown
Example:
hostname(config)# interface
tengigabitethernet 0/7
hostname(config-if)# channel-group 1 mode
on
hostname(config-if)# no shutdown
Repeat for each additional interface you want to add to the
EtherChannel.
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private
Ha cluster -Public to Private

More Related Content

What's hot

Mule Schema Validation Filter
Mule Schema Validation FilterMule Schema Validation Filter
Mule Schema Validation FilterAnkush Sharma
 
Exadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedExadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedUmair Mansoob
 
Changes in WebLogic 12.1.3 Every Administrator Must Know
Changes in WebLogic 12.1.3 Every Administrator Must KnowChanges in WebLogic 12.1.3 Every Administrator Must Know
Changes in WebLogic 12.1.3 Every Administrator Must KnowBruno Borges
 
Mule threading profile & processing strategy
Mule threading profile & processing strategyMule threading profile & processing strategy
Mule threading profile & processing strategychetan singhal
 
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware companyMySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware companyContinuent
 
My sql5.7 whatsnew_presentedatgids2015
My sql5.7 whatsnew_presentedatgids2015My sql5.7 whatsnew_presentedatgids2015
My sql5.7 whatsnew_presentedatgids2015Sanjay Manwani
 
MySQL Replication Performance Tuning for Fun and Profit!
MySQL Replication Performance Tuning for Fun and Profit!MySQL Replication Performance Tuning for Fun and Profit!
MySQL Replication Performance Tuning for Fun and Profit!Vitor Oliveira
 
MySQL Performance Tuning: The Perfect Scalability (OOW2019)
MySQL Performance Tuning: The Perfect Scalability (OOW2019)MySQL Performance Tuning: The Perfect Scalability (OOW2019)
MySQL Performance Tuning: The Perfect Scalability (OOW2019)Mirko Ortensi
 
Less05 asm instance
Less05 asm instanceLess05 asm instance
Less05 asm instanceAmit Bhalla
 
Key to a successful Exadata POC
Key to a successful Exadata POCKey to a successful Exadata POC
Key to a successful Exadata POCUmair Mansoob
 
Learn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c AdministrationLearn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c AdministrationRevelation Technologies
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 
MySQL Replication Performance in the Cloud
MySQL Replication Performance in the CloudMySQL Replication Performance in the Cloud
MySQL Replication Performance in the CloudVitor Oliveira
 
Zettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum DatabaseZettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum DatabasePivotalOpenSourceHub
 
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)Alfranio Júnior
 

What's hot (20)

Mule Schema Validation Filter
Mule Schema Validation FilterMule Schema Validation Filter
Mule Schema Validation Filter
 
Exadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs VirtualizedExadata Deployment Bare Metal vs Virtualized
Exadata Deployment Bare Metal vs Virtualized
 
Mule file connector
Mule file connectorMule file connector
Mule file connector
 
Changes in WebLogic 12.1.3 Every Administrator Must Know
Changes in WebLogic 12.1.3 Every Administrator Must KnowChanges in WebLogic 12.1.3 Every Administrator Must Know
Changes in WebLogic 12.1.3 Every Administrator Must Know
 
Weblogic server cluster
Weblogic server clusterWeblogic server cluster
Weblogic server cluster
 
Weblogic cluster
Weblogic clusterWeblogic cluster
Weblogic cluster
 
Mule threading profile & processing strategy
Mule threading profile & processing strategyMule threading profile & processing strategy
Mule threading profile & processing strategy
 
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware companyMySQL High Availability and Disaster Recovery with Continuent, a VMware company
MySQL High Availability and Disaster Recovery with Continuent, a VMware company
 
My sql5.7 whatsnew_presentedatgids2015
My sql5.7 whatsnew_presentedatgids2015My sql5.7 whatsnew_presentedatgids2015
My sql5.7 whatsnew_presentedatgids2015
 
MySQL Replication Performance Tuning for Fun and Profit!
MySQL Replication Performance Tuning for Fun and Profit!MySQL Replication Performance Tuning for Fun and Profit!
MySQL Replication Performance Tuning for Fun and Profit!
 
Oracle WebLogic 11g Topology
Oracle WebLogic 11g TopologyOracle WebLogic 11g Topology
Oracle WebLogic 11g Topology
 
Running Galera Cluster on Microsoft Azure
Running Galera Cluster on Microsoft AzureRunning Galera Cluster on Microsoft Azure
Running Galera Cluster on Microsoft Azure
 
MySQL Performance Tuning: The Perfect Scalability (OOW2019)
MySQL Performance Tuning: The Perfect Scalability (OOW2019)MySQL Performance Tuning: The Perfect Scalability (OOW2019)
MySQL Performance Tuning: The Perfect Scalability (OOW2019)
 
Less05 asm instance
Less05 asm instanceLess05 asm instance
Less05 asm instance
 
Key to a successful Exadata POC
Key to a successful Exadata POCKey to a successful Exadata POC
Key to a successful Exadata POC
 
Learn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c AdministrationLearn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c Administration
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
MySQL Replication Performance in the Cloud
MySQL Replication Performance in the CloudMySQL Replication Performance in the Cloud
MySQL Replication Performance in the Cloud
 
Zettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum DatabaseZettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum Database
 
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)
MySQL High Availability: Managing Farms of Distributed Servers (MySQL Fabric)
 

Viewers also liked

Unifi securitybugs sep2013
Unifi securitybugs sep2013Unifi securitybugs sep2013
Unifi securitybugs sep2013testslidesha12
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!Eslam Ashraf
 
установка колонн летучек
установка колонн летучекустановка колонн летучек
установка колонн летучекgeoplast2007ru
 
опи рн юнг усн 06.2012
опи рн юнг усн 06.2012опи рн юнг усн 06.2012
опи рн юнг усн 06.2012geoplast2007ru
 
Using Capifony for Symfony apps deployment.
Using Capifony for Symfony apps deployment.Using Capifony for Symfony apps deployment.
Using Capifony for Symfony apps deployment.Žilvinas Kuusas
 
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015Victoria Livschitz
 
Autonomic Application Delivery with Tonomi
Autonomic Application Delivery with TonomiAutonomic Application Delivery with Tonomi
Autonomic Application Delivery with TonomiVictoria Livschitz
 
Aleksander Królikowski
Aleksander KrólikowskiAleksander Królikowski
Aleksander KrólikowskiDysk
 
New zealand Tourism
New zealand TourismNew zealand Tourism
New zealand TourismShobha Verma
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!Eslam Ashraf
 
Revamping the math classroom
Revamping the math classroomRevamping the math classroom
Revamping the math classroomcamille541
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!Eslam Ashraf
 
Makalah biologi
Makalah biologiMakalah biologi
Makalah biologimelanisha
 
Informal invitation
Informal invitationInformal invitation
Informal invitationmelanisha
 
технология селективной изоляции водопритока
технология селективной изоляции водопритокатехнология селективной изоляции водопритока
технология селективной изоляции водопритокаgeoplast2007ru
 
Autonomic Application Management with Qubell (and Docker)
Autonomic Application Management with Qubell (and Docker)Autonomic Application Management with Qubell (and Docker)
Autonomic Application Management with Qubell (and Docker)Victoria Livschitz
 

Viewers also liked (20)

Unifi securitybugs sep2013
Unifi securitybugs sep2013Unifi securitybugs sep2013
Unifi securitybugs sep2013
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!
 
INTERNET PROTOCOL
INTERNET PROTOCOLINTERNET PROTOCOL
INTERNET PROTOCOL
 
установка колонн летучек
установка колонн летучекустановка колонн летучек
установка колонн летучек
 
опи рн юнг усн 06.2012
опи рн юнг усн 06.2012опи рн юнг усн 06.2012
опи рн юнг усн 06.2012
 
820036301
820036301820036301
820036301
 
Using Capifony for Symfony apps deployment.
Using Capifony for Symfony apps deployment.Using Capifony for Symfony apps deployment.
Using Capifony for Symfony apps deployment.
 
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015
Autonomic Management of Cloud Applications with Tonomi, Gluecon Keynote, 2015
 
Autonomic Application Delivery with Tonomi
Autonomic Application Delivery with TonomiAutonomic Application Delivery with Tonomi
Autonomic Application Delivery with Tonomi
 
Sli027
Sli027Sli027
Sli027
 
Aleksander Królikowski
Aleksander KrólikowskiAleksander Królikowski
Aleksander Królikowski
 
New zealand Tourism
New zealand TourismNew zealand Tourism
New zealand Tourism
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!
 
非リア充
非リア充非リア充
非リア充
 
Revamping the math classroom
Revamping the math classroomRevamping the math classroom
Revamping the math classroom
 
طريقنا الى القلوب!
طريقنا الى القلوب!طريقنا الى القلوب!
طريقنا الى القلوب!
 
Makalah biologi
Makalah biologiMakalah biologi
Makalah biologi
 
Informal invitation
Informal invitationInformal invitation
Informal invitation
 
технология селективной изоляции водопритока
технология селективной изоляции водопритокатехнология селективной изоляции водопритока
технология селективной изоляции водопритока
 
Autonomic Application Management with Qubell (and Docker)
Autonomic Application Management with Qubell (and Docker)Autonomic Application Management with Qubell (and Docker)
Autonomic Application Management with Qubell (and Docker)
 

Similar to Ha cluster -Public to Private

Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimizationsolarisyougood
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringCisco Russia
 
Architecture of exadata database machine – Part II
Architecture of exadata database machine – Part IIArchitecture of exadata database machine – Part II
Architecture of exadata database machine – Part IIParesh Nayak,OCP®,Prince2®
 
NAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNetProtocol Xpert
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003Armando Leon
 
How oracle 12c flexes its muscles against oracle 11g r2 final
How oracle 12c flexes its muscles against oracle 11g r2 finalHow oracle 12c flexes its muscles against oracle 11g r2 final
How oracle 12c flexes its muscles against oracle 11g r2 finalAjith Narayanan
 
Oracle flex asm & flex cluster
Oracle flex asm & flex clusterOracle flex asm & flex cluster
Oracle flex asm & flex clusterGhanshyam Khetan
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software ReleaseIsabella789
 
configuring_cisco_stackwise_virtual.pdf
configuring_cisco_stackwise_virtual.pdfconfiguring_cisco_stackwise_virtual.pdf
configuring_cisco_stackwise_virtual.pdfAbdulfattahAssad
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesYaser Rahmati
 
Divide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloudDivide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloudStephen Gordon
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to HeroDhruv Sharma
 
Flex your Database on 12c's Flex ASM Flex Cluster
Flex your Database on 12c's Flex ASM Flex ClusterFlex your Database on 12c's Flex ASM Flex Cluster
Flex your Database on 12c's Flex ASM Flex ClusterALI ANWAR, OCP®
 
Flex Your Database on 12c's Flex ASM and Flex Cluster
Flex Your Database on 12c's Flex ASM and Flex ClusterFlex Your Database on 12c's Flex ASM and Flex Cluster
Flex Your Database on 12c's Flex ASM and Flex ClusterMaaz Anjum
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
San 101 basics of administrating a san
San 101 basics of administrating a sanSan 101 basics of administrating a san
San 101 basics of administrating a sanpineapplebed24
 

Similar to Ha cluster -Public to Private (20)

Failover cluster
Failover clusterFailover cluster
Failover cluster
 
Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimization
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA Clustering
 
Architecture of exadata database machine – Part II
Architecture of exadata database machine – Part IIArchitecture of exadata database machine – Part II
Architecture of exadata database machine – Part II
 
NAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNAT with ASA & ASA Security Context
NAT with ASA & ASA Security Context
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003Ms Tech Ed   Best Practices For Exchange Server Cluster Deployments June 2003
Ms Tech Ed Best Practices For Exchange Server Cluster Deployments June 2003
 
How oracle 12c flexes its muscles against oracle 11g r2 final
How oracle 12c flexes its muscles against oracle 11g r2 finalHow oracle 12c flexes its muscles against oracle 11g r2 final
How oracle 12c flexes its muscles against oracle 11g r2 final
 
Oracle flex asm & flex cluster
Oracle flex asm & flex clusterOracle flex asm & flex cluster
Oracle flex asm & flex cluster
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
 
configuring_cisco_stackwise_virtual.pdf
configuring_cisco_stackwise_virtual.pdfconfiguring_cisco_stackwise_virtual.pdf
configuring_cisco_stackwise_virtual.pdf
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologies
 
Divide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloudDivide and conquer: resource segregation in the OpenStack cloud
Divide and conquer: resource segregation in the OpenStack cloud
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Flex your Database on 12c's Flex ASM Flex Cluster
Flex your Database on 12c's Flex ASM Flex ClusterFlex your Database on 12c's Flex ASM Flex Cluster
Flex your Database on 12c's Flex ASM Flex Cluster
 
Flex Your Database on 12c's Flex ASM and Flex Cluster
Flex Your Database on 12c's Flex ASM and Flex ClusterFlex Your Database on 12c's Flex ASM and Flex Cluster
Flex Your Database on 12c's Flex ASM and Flex Cluster
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Apache ignite v1.3
Apache ignite v1.3Apache ignite v1.3
Apache ignite v1.3
 
San 101 basics of administrating a san
San 101 basics of administrating a sanSan 101 basics of administrating a san
San 101 basics of administrating a san
 

More from testslidesha12 (8)

<img src="xx">
<img src="xx"><img src="xx">
<img src="xx">
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
One pagepdf
One pagepdfOne pagepdf
One pagepdf
 
<img src="xx">
<img src="xx"><img src="xx">
<img src="xx">
 

Recently uploaded

Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolSERUDS INDIA
 

Recently uploaded (20)

Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnool
 

Ha cluster -Public to Private

  • 1. C H A P T E R 1-1 Cisco ASA Series CLI Configuration Guide 1 Configuring a Cluster of ASAs Clustering lets you group multiple ASAs together as a single logical device. A cluster provides all the convenience of a single device (management, integration into a network) while achieving the increased throughput and redundancy of multiple devices. Note Some features are not supported when using clustering. See the “Unsupported Features” section on page 1-17. • Information About ASA Clustering, page 1-1 • Licensing Requirements for ASA Clustering, page 1-23 • Prerequisites for ASA Clustering, page 1-23 • Guidelines and Limitations, page 1-24 • Default Settings, page 1-27 • Configuring ASA Clustering, page 1-27 • Managing ASA Cluster Members, page 1-47 • Monitoring the ASA Cluster, page 1-52 • Configuration Examples for ASA Clustering, page 1-56 • Feature History for ASA Clustering, page 1-71 Information About ASA Clustering • How the ASA Cluster Fits into Your Network, page 1-2 • Performance Scaling Factor, page 1-2 • Cluster Members, page 1-2 • ASA Cluster Interfaces, page 1-4 • Cluster Control Link, page 1-6 • High Availability within the ASA Cluster, page 1-9 • Configuration Replication, page 1-10 • ASA Cluster Management, page 1-10 • Load Balancing Methods, page 1-12
  • 2. 1-2 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering • How the ASA Cluster Manages Connections, page 1-15 • ASA Features and Clustering, page 1-17 How the ASA Cluster Fits into Your Network The cluster consists of multiple ASAs acting as a single unit. (See the “Licensing Requirements for ASA Clustering” section on page 1-23 for the number of units supported per model). To act as a cluster, the ASAs need the following infrastructure: • Isolated, high-speed backplane network for intra-cluster communication, known as the cluster control link. See the “Cluster Control Link” section on page 1-6. • Management access to each ASA for configuration and monitoring. See the “ASA Cluster Management” section on page 1-10. When you place the cluster in your network, the upstream and downstream routers need to be able to load-balance the data coming to and from the cluster using one of the following methods: • Spanned EtherChannel (Recommended)—Interfaces on multiple members of the cluster are grouped into a single EtherChannel; the EtherChannel performs load balancing between units. See the “Spanned EtherChannel (Recommended)” section on page 1-12. • Policy-Based Routing (Routed firewall mode only)—The upstream and downstream routers perform load balancing between units using route maps and ACLs. See the “Policy-Based Routing (Routed Firewall Mode Only)” section on page 1-14. • Equal-Cost Multi-Path Routing (Routed firewall mode only)—The upstream and downstream routers perform load balancing between units using equal cost static or dynamic routes. See the “Equal-Cost Multi-Path Routing (Routed Firewall Mode Only)” section on page 1-15. Performance Scaling Factor When you combine multiple units into a cluster, you can expect a performance of approximately: • 70% of the combined throughput • 60% of maximum connections • 50% of connections per second For example, for throughput, the ASA 5585-X with SSP-40 can handle approximately 10 Gbps of real world firewall traffic when running alone. For a cluster of 8 units, the maximum combined throughput will be approximately 70% of 80 Gbps (8 units x 10 Gbps): 56 Gbps. Cluster Members • ASA Hardware and Software Requirements, page 1-3 • Bootstrap Configuration, page 1-3 • Master and Slave Unit Roles, page 1-3 • Master Unit Election, page 1-3
  • 3. 1-3 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering ASA Hardware and Software Requirements All units in a cluster: • Must be the same model with the same DRAM. You do not have to have the same amount of flash memory. • Must run the identical software except at the time of an image upgrade. Hitless upgrade is supported between any maintenance releases within a minor release (such as 9.0(1) to 9.0(4)), adjacent minor releases (such as 9.0 to 9.1), and last minor release of previous version to the next major release (such as 8.6 to 9.0, where 8.6 is the last version available for your model previous to 9.0). • Must be in the same geographical location. • Must be in the same security context mode, single or multiple. • (Single context mode) Must be in the same firewall mode, routed or transparent. • New cluster members must use the same SSL encryption setting (the ssl encryption command) as the master unit for initial cluster control link communication before configuration replication. Bootstrap Configuration On each device, you configure a minimal bootstrap configuration including the cluster name, cluster control link interface, and other cluster settings. The first unit on which you enable clustering typically becomes the master unit. When you enable clustering on subsequent units, they join the cluster as slaves. Master and Slave Unit Roles One member of the cluster is the master unit. The master unit is determined by the priority setting in the bootstrap configuration; the priority is set between 1 and 100, where 1 is the highest priority. All other members are slave units. Typically, when you first create a cluster, the first unit you add becomes the master unit simply because it is the only unit in the cluster so far. You must perform all configuration (aside from the bootstrap configuration) on the master unit only; the configuration is then replicated to the slave units. In the case of physical assets, such as interfaces, the configuration of the master unit is mirrored on all slave units. For example, if you configure GigabitEthernet 0/1 as the inside interface and GigabitEthernet 0/0 as the outside interface, then these interfaces are also used on the slave units as inside and outside interfaces. Some features do not scale in a cluster, and the master unit handles all traffic for those features. See the “Centralized Features” section on page 1-18. Master Unit Election Members of the cluster communicate over the cluster control link to elect a master unit as follows: 1. When you enable clustering for a unit (or when it first starts up with clustering already enabled), it broadcasts an election request every 3 seconds. 2. Any other units with a higher priority respond to the election request; the priority is set between 1 and 100, where 1 is the highest priority. 3. If after 45 seconds, a unit does not receive a response from another unit with a higher priority, then it becomes master.
  • 4. 1-4 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Note If multiple units tie for the highest priority, the cluster unit name and then the serial number is used to determine the master. 4. If a unit later joins the cluster with a higher priority, it does not automatically become the master unit; the existing master unit always remains as the master unless it stops responding, at which point a new master unit is elected. Note You can manually force a unit to become the master. For centralized features, if you force a master unit change, then all connections are dropped, and you have to re-establish the connections on the new master unit. See the “Centralized Features” section on page 1-18 for a list of centralized features. ASA Cluster Interfaces You can configure data interfaces as either Spanned EtherChannels or as Individual interfaces. All data interfaces in the cluster must be one type only. • Interface Types, page 1-4 • Interface Type Mode, page 1-6 Interface Types • Spanned EtherChannel (Recommended) You can group one or more interfaces per unit into an EtherChannel that spans all units in the cluster. The EtherChannel aggregates the traffic across all the available active interfaces in the channel. A Spanned EtherChannel can be configured in both routed and transparent firewall modes. In routed mode, the EtherChannel is configured as a routed interface with a single IP address. In transparent mode, the IP address is assigned to the bridge group, not to the interface. The EtherChannel inherently provides load balancing as part of basic operation. See also the “Spanned EtherChannel (Recommended)” section on page 1-12.
  • 5. 1-5 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering • Individual interfaces (Routed firewall mode only) Individual interfaces are normal routed interfaces, each with their own Local IP address. Because interface configuration must be configured only on the master unit, the interface configuration lets you set a pool of IP addresses to be used for a given interface on the cluster members, including one for the master. The Main cluster IP address is a fixed address for the cluster that always belongs to the current master unit. The Main cluster IP address is a secondary IP address for the master unit; the Local IP address is always the primary address for routing. The Main cluster IP address provides consistent management access to an address; when a master unit changes, the Main cluster IP address moves to the new master unit, so management of the cluster continues seamlessly. Load balancing, however, must be configured separately on the upstream switch in this case. For information about load balancing, see the “Load Balancing Methods” section on page 1-12. Note We recommend Spanned EtherChannels instead of Individual interfaces because Individual interfaces rely on routing protocols to load-balance traffic, and routing protocols often have slow convergence during a link failure. ASA1 ASA2 ASA3 ASA4 ten0/8 ten0/9 ten0/9 ten0/9 ten0/9 ten0/8 ten0/8 ten0/8 port-channel 5 port-channel 6 Inside Spanned port-channel 1 10.1.1.1 Outside Spanned port-channel 2 209.165.201.1 Outside SwitchInside Switch 333361
  • 6. 1-6 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Interface Type Mode You must choose the interface type (Spanned EtherChannel or Individual) before you configure your devices. See the following guidelines for the interface type mode: • You can always configure the management-only interface as an Individual interface (recommended), even in Spanned EtherChannel mode. The management interface can be an Individual interface even in transparent firewall mode. • In Spanned EtherChannel mode, if you configure the management interface as an Individual interface, you cannot enable dynamic routing for the management interface. You must use a static route. • In multiple context mode, you must choose one interface type for all contexts. For example, if you have a mix of transparent and routed mode contexts, you must use Spanned EtherChannel mode for all contexts because that is the only interface type allowed for transparent mode. Cluster Control Link Each unit must dedicate at least one hardware interface as the cluster control link. • Cluster Control Link Traffic Overview, page 1-7 • Cluster Control Link Network, page 1-7 • Sizing the Cluster Control Link, page 1-7 • Cluster Control Link Redundancy, page 1-8 ASA1/Master ASA2 ASA3 ASA4 inside ten0/8 10.1.1.1 (master) 10.1.1.2 (local) inside ten0/8 10.1.1.3 (local) inside ten0/8 10.1.1.4 (local) inside ten0/8 10.1.1.5 (local) ten0/9 outside 209.165.201.1 (master) 209.165.201.2 (local) ten0/9 outside 209.165.201.3 (local) ten0/9 outside 209.165.201.4 (local) ten0/9 outside 209.165.201.5 (local) ten0/0 Load Balancing: PBR or ECMP Load Balancing: PBR or ECMP ten0/1 ten0/2 ten0/3 ten0/0 ten0/1 ten0/2 ten0/3 Outside SwitchInside Switch 333359
  • 7. 1-7 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering • Cluster Control Link Latency and Reliability, page 1-8 • Cluster Control Link Failure, page 1-8 Cluster Control Link Traffic Overview Cluster control link traffic includes both control and data traffic. Control traffic includes: • Master election. (See the “Cluster Members” section on page 1-2.) • Configuration replication. (See the “Configuration Replication” section on page 1-10.) • Health monitoring. (See the “Unit Health Monitoring” section on page 1-9.) Data traffic includes: • State replication. (See the “Data Path Connection State Replication” section on page 1-9.) • Connection ownership queries and data packet forwarding. (See the “Rebalancing New TCP Connections Across the Cluster” section on page 1-17.) Cluster Control Link Network Each cluster control link has an IP address on the same subnet. This subnet should be isolated from all other traffic, and should include only the ASA cluster control link interfaces. For a 2-member cluster, do not directly-connect the cluster control link from one ASA to the other ASA. If you directly connect the interfaces, then when one unit fails, the cluster control link fails, and thus the remaining healthy unit fails. If you connect the cluster control link through a switch, then the cluster control link remains up for the healthy unit. Sizing the Cluster Control Link You should assign an equal amount of bandwidth to the cluster control link as you assign for through traffic. For example, if you have the ASA 5585-X with SSP-60, which can pass 14 Gbps per unit maximum in a cluster, then you should also assign interfaces to the cluster control link that can pass approximately 14 Gbps. In this case, you could use 2 Ten Gigabit Ethernet interfaces in an EtherChannel for the cluster control link, and use the rest of the interfaces as desired for data links. Cluster control link traffic is comprised mainly of state update and forwarded packets. The amount of traffic at any given time on the cluster control link varies. For example state updates could consume up to 10% of the through traffic amount if through traffic consists exclusively of short-lived TCP connections. The amount of forwarded traffic depends on the load-balancing efficacy or whether there is a lot of traffic for centralized features. For example: • NAT results in poor load balancing of connections, and the need to rebalance all returning traffic to the correct units. • AAA for network access is a centralized feature, so all traffic is forwarded to the master unit. • When membership changes, the cluster needs to rebalance a large number of connections, thus temporarily using a large amount of cluster control link bandwidth. A higher-bandwidth cluster control link helps the cluster to converge faster when there are membership changes and prevents throughput bottlenecks.
  • 8. 1-8 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Note If your cluster has large amounts of asymmetric (rebalanced) traffic, then the cluster control link should be even larger. Cluster Control Link Redundancy We recommend using an EtherChannel for the cluster control link, so you can pass traffic on multiple links in the EtherChannel while still achieving redundancy. The following diagram shows how to use an EtherChannel as a cluster control link in a Virtual Switching System (VSS) or Virtual Port Channel (vPC) environment. All links in the EtherChannel are active. When the switch is part of a VSS or vPC, then you can connect ASA interfaces within the same EtherChannel to separate switches in the VSS or vPC. The switch interfaces are members of the same EtherChannel port-channel interface, because the separate switches act like a single switch. Note that this EtherChannel is device-local, not a Spanned EtherChannel. Cluster Control Link Latency and Reliability To ensure cluster control link functionality, be sure the round-trip time (RTT) between units is less than the following: • 5 ms To check your latency, perform a ping on the cluster control link between units. The cluster control link must be reliable, with no out-of-order or dropped packets. Cluster Control Link Failure If the cluster control link line protocol goes down for a unit, then clustering is disabled; data interfaces are shut down until you manually re-enable clustering on each affected unit (after you fix the cluster control link.) Note When an ASA becomes inactive, all data interfaces are shut down; only the management-only interface can send and receive traffic. The management interface remains up using the IP address the unit received from the cluster IP pool. However if you reload, and the unit is still inactive in the cluster, the management interface is not accessible (because it then uses the Main IP address, which is the same as the master unit). You must use the console port for any further configuration. Switch Switch Virtual Switch Link 333222 ASA1 ASA2 ASA3
  • 9. 1-9 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering High Availability within the ASA Cluster • Unit Health Monitoring, page 1-9 • Interface monitoring, page 1-9 • Unit or Interface Failure, page 1-9 • Data Path Connection State Replication, page 1-9 Unit Health Monitoring The master unit monitors every slave unit by sending keepalive messages over the cluster control link periodically (the period is configurable). Each slave unit monitors the master unit using the same mechanism. Interface monitoring Each unit monitors the link status of all hardware interfaces in use, and reports status changes to the master unit. • Spanned EtherChannel—Uses cluster Link Aggregation Control Protocol (cLACP). Each unit monitors the link status and the cLACP protocol messages to determine if the port is still active in the EtherChannel. The status is reported to the master unit. • Individual interfaces (Routed mode only)—Each unit self-monitors its interfaces and reports interface status to the master unit. Unit or Interface Failure When health monitoring is enabled, a unit is removed from the cluster if it fails or if its interfaces fail. If an interface fails on a particular unit, but the same interface is active on other units, then the unit is removed from the cluster. When a unit in the cluster fails, the connections hosted by that unit are seamlessly transferred to other units; state information for traffic flows is shared over the control cluster link. If the master unit fails, then another member of the cluster with the highest priority (lowest number) becomes the master. Note When an ASA becomes inactive (either manually or through a health check failure), all data interfaces are shut down; only the management-only interface can send and receive traffic. The management interface remains up using the IP address the unit received from the cluster IP pool. However if you reload, and the unit is still inactive in the cluster, the management interface is not accessible (because it then uses the Main IP address, which is the same as the master unit). You must use the console port for any further configuration. Data Path Connection State Replication Every connection has one owner and at least one backup owner in the cluster. The backup owner does not take over the connection in the event of a failure; instead, it stores TCP/UDP state information, so that the connection can be seamlessly transferred to a new owner in case of a failure.
  • 10. 1-10 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering If the owner becomes unavailable, the first unit to receive packets from the connection (based on load balancing) contacts the backup owner for the relevant state information so it can become the new owner. Some traffic requires state information above the TCP or UDP layer. See Table 1-1 for clustering support or lack of support for this kind of traffic. Configuration Replication All units in the cluster share a single configuration. Except for the initial bootstrap configuration, you can only make configuration changes on the master unit, and changes are automatically replicated to all other units in the cluster. ASA Cluster Management • Management Network, page 1-10 • Management Interface, page 1-10 • Master Unit Management Vs. Slave Unit Management, page 1-11 • RSA Key Replication, page 1-11 • ASDM Connection Certificate IP Address Mismatch, page 1-11 Management Network We recommend connecting all units to a single management network. This network is separate from the cluster control link. Management Interface For the management interface, we recommend using one of the dedicated management interfaces. You can configure the management interfaces as Individual interfaces (for both routed and transparent modes) or as a Spanned EtherChannel interface. Table 1-1 ASA Features Replicated Across the Cluster Traffic State Support Notes Up time Yes Keeps track of the system up time. ARP Table Yes Transparent mode only. MAC address table Yes Transparent mode only. User Identity Yes Includes AAA rules (uauth) and identify firewall. IPv6 Neighbor database Yes Dynamic routing Yes Multi-site licensing No SNMP Engine ID No VPN (Site-to-Site) No VPN sessions will be disconnected if the master unit fails.
  • 11. 1-11 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering We recommend using Individual interfaces for management, even if you use Spanned EtherChannels for your data interfaces. Individual interfaces let you connect directly to each unit if necessary, while a Spanned EtherChannel interface only allows remote connection to the current master unit. Note If you use Spanned EtherChannel interface mode, and configure the management interface as an Individual interface, you cannot enable dynamic routing for the management interface. You must use a static route. For an Individual interface, the Main cluster IP address is a fixed address for the cluster that always belongs to the current master unit. For each interface, you also configure a range of addresses so that each unit, including the current master, can use a Local address from the range. The Main cluster IP address provides consistent management access to an address; when a master unit changes, the Main cluster IP address moves to the new master unit, so management of the cluster continues seamlessly. The Local IP address is used for routing, and is also useful for troubleshooting. For example, you can manage the cluster by connecting to the Main cluster IP address, which is always attached to the current master unit. To manage an individual member, you can connect to the Local IP address. For outbound management traffic such as TFTP or syslog, each unit, including the master unit, uses the Local IP address to connect to the server. For a Spanned EtherChannel interface, you can only configure one IP address, and that IP address is always attached to the master unit. You cannot connect directly to a slave unit using the EtherChannel interface; we recommend configuring the management interface as an Individual interface so you can connect to each unit. Note that you can use a device-local EtherChannel for management. Master Unit Management Vs. Slave Unit Management Aside from the bootstrap configuration, all management and monitoring can take place on the master unit. From the master unit, you can check runtime statistics, resource usage, or other monitoring information of all units. You can also issue a command to all units in the cluster, and replicate the console messages from slave units to the master unit. You can monitor slave units directly if desired. Although also available from the master unit, you can perform file management on slave units (including backing up the configuration and updating images). The following functions are not available from the master unit: • Monitoring per-unit cluster-specific statistics. • Syslog monitoring per unit. RSA Key Replication When you create an RSA key on the master unit, the key is replicated to all slave units. If you have an SSH session to the Main cluster IP address, you will be disconnected if the master unit fails. The new master unit uses the same key for SSH connections, so you do not need to update the cached SSH host key when you reconnect to the new master unit. ASDM Connection Certificate IP Address Mismatch By default, a self-signed certificate is used for the ASDM connection based on the Local IP address. If you connect to the Main cluster IP address using ASDM, then a warning message about a mismatched IP address appears because the certificate uses the Local IP address, and not the Main cluster IP address.
  • 12. 1-12 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering You can ignore the message and establish the ASDM connection. However, to avoid this type of warning, you can enroll a certificate that contains the Main cluster IP address and all the Local IP addresses from the IP address pool. You can then use this certificate for each cluster member. For more information, see Chapter 1, “Configuring Digital Certificates.” Load Balancing Methods See also the “ASA Cluster Interfaces” section on page 1-4. • Spanned EtherChannel (Recommended), page 1-12 • Policy-Based Routing (Routed Firewall Mode Only), page 1-14 • Equal-Cost Multi-Path Routing (Routed Firewall Mode Only), page 1-15 Spanned EtherChannel (Recommended) You can group one or more interfaces per unit into an EtherChannel that spans all units in the cluster. The EtherChannel aggregates the traffic across all the available active interfaces in the channel. • Spanned EtherChannel Benefits, page 1-12 • Guidelines for Maximum Throughput, page 1-12 • Load Balancing, page 1-13 • EtherChannel Redundancy, page 1-13 • Connecting to a VSS or vPC, page 1-13 Spanned EtherChannel Benefits The EtherChannel method of load-balancing is recommended over other methods for the following benefits: • Faster failure discovery. • Faster convergence time. Individual interfaces rely on routing protocols to load-balance traffic, and routing protocols often have slow convergence during a link failure. • Ease of configuration. For more information about EtherChannels in general (not just for clustering), see the “EtherChannels” section on page 1-5. Guidelines for Maximum Throughput To achieve maximum throughput, we recommend the following: • Use a load balancing hash algorithm that is “symmetric,” meaning that packets from both directions will have the same hash, and will be sent to the same ASA in the Spanned EtherChannel. We recommend using the source and destination IP address (the default) or the source and destination port as the hashing algorithm. • Use the same type of line cards when connecting the ASAs to the switch so that hashing algorithms applied to all packets are the same.
  • 13. 1-13 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Load Balancing The EtherChannel link is selected using a proprietary hash algorithm, based on source or destination IP addresses and TCP and UDP port numbers. Note On the ASA, do not change the load-balancing algorithm from the default (see the “Customizing the EtherChannel” section on page 1-30). On the switch, we recommend that you use one of the following algorithms: source-dest-ip or source-dest-ip-port (see the Nexus OS or IOS port-channel load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the ASAs in a cluster. The number of links in the EtherChannel affects load balancing. See the “Load Balancing” section on page 1-7 for more information. Symmetric load balancing is not always possible. If you configure NAT, then forward and return packets will have different IP addresses and/or ports. Return traffic will be sent to a different unit based on the hash, and the cluster will have to redirect most returning traffic to the correct unit. See the “NAT” section on page 1-21 for more information. EtherChannel Redundancy The EtherChannel has built-in redundancy. It monitors the line protocol status of all links. If one link fails, traffic is re-balanced between remaining links. If all links in the EtherChannel fail on a particular unit, but other units are still active, then the unit is removed from the cluster. Connecting to a VSS or vPC You can include multiple interfaces per ASA in the Spanned EtherChannel. Multiple interfaces per ASA are especially useful for connecting to both switches in a VSS or vPC. Keep in mind that an EtherChannel can have only 8 active interfaces out of 16 maximum; the remaining 8 interfaces are on standby in case of link failure. The following figure shows a 4-ASA cluster and an 8-ASA cluster, both with a total of 16 links in the EtherChannel. The active links are shown as solid lines, while the inactive links are dotted. cLACP load-balancing can automatically choose the best 8 links to be active in the EtherChannel. As shown, cLACP helps achieve load balancing at the link level.
  • 14. 1-14 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Policy-Based Routing (Routed Firewall Mode Only) When using Individual interfaces, each ASA interface maintains its own IP address and MAC address. One method of load balancing is Policy-Based Routing (PBR). We recommend this method if you are already using PBR, and want to take advantage of your existing infrastructure. This method might offer additional tuning options vs. Spanned EtherChannel as well. PBR makes routing decisions based on a route map and ACL. You must manually divide traffic between all ASAs in a cluster. Because PBR is static, it may not achieve the optimum load balancing result at all times. To achieve the best performance, we recommend that you configure the PBR policy so that forward and return packets of a connection are directed to the same physical ASA. For example, if you have a Cisco router, redundancy can be achieved by using IOS PBR with Object Tracking. IOS Object Tracking monitors each ASA using ICMP ping. PBR can then enable or disable route maps based on reachability of a particular ASA. See the following URLs for more details: http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a4409.shtml http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtpbrtrk.html#wp1057830 Note If you use this method of load-balancing, you can use a device-local EtherChannel as an Individual interface. Router or Access Switch Virtual Switch Link Router or Access Switch Virtual Switch Link 333215 ASA1 ASA2 ASA3 ASA4 ASA1 ASA8 Switch 2Switch 1Switch 2Switch 1 port-channel1 port-channel1 port-channel1port-channel1
  • 15. 1-15 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Equal-Cost Multi-Path Routing (Routed Firewall Mode Only) When using Individual interfaces, each ASA interface maintains its own IP address and MAC address. One method of load balancing is Equal-Cost Multi-Path (ECMP) routing. We recommend this method if you are already using ECMP, and want to take advantage of your existing infrastructure. This method might offer additional tuning options vs. Spanned EtherChannel as well. ECMP routing can forward packets over multiple “best paths” that tie for top place in the routing metric. Like EtherChannel, a hash of source and destination IP addresses and/or source and destination ports can be used to send a packet to one of the next hops. If you use static routes for ECMP routing, then an ASA failure can cause problems; the route continues to be used, and traffic to the failed ASA will be lost. If you use static routes, be sure to use a static route monitoring feature such as Object Tracking. We recommend using dynamic routing protocols to add and remove routes, in which case, you must configure each ASA to participate in dynamic routing. Note If you use this method of load-balancing, you can use a device-local EtherChannel as an Individual interface. How the ASA Cluster Manages Connections • Connection Roles, page 1-15 • New Connection Ownership, page 1-16 • Sample Data Flow, page 1-16 • Rebalancing New TCP Connections Across the Cluster, page 1-17 Connection Roles There are 3 different ASA roles defined for each connection: • Owner—The unit that initially receives the connection. The owner maintains the TCP state and processes packets. A connection has only one owner. • Director—The unit that handles owner lookup requests from forwarders and also maintains the connection state to serve as a backup if the owner fails. When the owner receives a new connection, it chooses a director based on a hash of the source/destination IP address and TCP ports, and sends a message to the director to register the new connection. If packets arrive at any unit other than the owner, the unit queries the director about which unit is the owner so it can forward the packets. A connection has only one director. • Forwarder—A unit that forwards packets to the owner. If a forwarder receives a packet for a connection it does not own, it queries the director for the owner, and then establishes a flow to the owner for any other packets it receives for this connection. The director can also be a forwarder. Note that if a forwarder receives the SYN-ACK packet, it can derive the owner directly from a SYN cookie in the packet, so it does not need to query the director. (If you disable TCP sequence randomization, the SYN cookie is not used; a query to the director is required.) For short-lived flows such as DNS and ICMP, instead of querying, the forwarder immediately sends the packet to the director, which then sends them to the owner. A connection can have multiple forwarders; the most efficient throughput is achieved by a good load-balancing method where there are no forwarders and all packets of a connection are received by the owner.
  • 16. 1-16 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering New Connection Ownership When a new connection is directed to a member of the cluster via load balancing, that unit owns both directions of the connection. If any connection packets arrive at a different unit, they are forwarded to the owner unit over the cluster control link. For best performance, proper external load balancing is required for both directions of a flow to arrive at the same unit, and for flows to be distributed evenly between units. If a reverse flow arrives at a different unit, it is redirected back to the original unit. For more information, see the “Load Balancing Methods” section on page 1-12. Sample Data Flow The following example shows the establishment of a new connection. 1. The SYN packet originates from the client and is delivered to an ASA (based on the load balancing method), which becomes the owner. The owner creates a flow, encodes owner information into a SYN cookie, and forwards the packet to the server. 2. The SYN-ACK packet originates from the server and is delivered to a different ASA (based on the load balancing method). This ASA is the forwarder. 3. Because the forwarder does not own the connection, it decodes owner information from the SYN cookie, creates a forwarding flow to the owner, and forwards the SYN-ACK to the owner. 4. The owner sends a state update to the director, and forwards the SYN-ACK to the client. 5. The director receives the state update from the owner, creates a flow to the owner, and records the TCP state information as well as the owner. The director acts as the backup owner for the connection. 6. Any subsequent packets delivered to the forwarder will be forwarded to the owner. 7. If packets are delivered to any additional units, it will query the director for the owner and establish a flow. 8. Any state change for the flow results in a state update from the owner to the director. Client SYN/ACK 1. SYN 1. SYN 2. SYN/ACK 4.State update 3.SYN/ACK Director ASA Cluster Server Owner Forwarder After step 4, all remaining packets are forwarded directly to the owner. 333480 Inside Outside
  • 17. 1-17 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Rebalancing New TCP Connections Across the Cluster If the load balancing capabilities of the upstream or downstream routers result in unbalanced flow distribution, you can configure overloaded units to redirect new TCP flows to other units. No existing flows will be moved to other units. ASA Features and Clustering • Unsupported Features, page 1-17 • Centralized Features, page 1-18 • Features Applied to Individual Units, page 1-18 • Dynamic Routing, page 1-19 • NAT, page 1-21 • Syslog and Netflow, page 1-22 • SNMP, page 1-22 • VPN, page 1-22 • FTP, page 1-23 • Cisco TrustSec, page 1-23 Unsupported Features These features cannot be configured with clustering enabled, and the commands will be rejected. • Unified Communications • Remote access VPN (SSL VPN and IPsec VPN) • The following application inspections: – CTIQBE – GTP – H323, H225, and RAS – IPsec passthrough – MGCP – MMP – RTSP – SIP – SCCP (Skinny) – WAAS – WCCP • Botnet Traffic Filter • Auto Update Server • DHCP client, server, relay, and proxy • VPN load balancing
  • 18. 1-18 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering • Failover • ASA CX module Centralized Features The following features are only supported on the master unit, and are not scaled for the cluster. For example, you have a cluster of eight units (5585-X with SSP-60). The Other VPN license allows a maximum of 10,000 site-to-site IPsec tunnels for one ASA 5585-X with SSP-60. For the entire cluster of eight units, you can only use 10,000 tunnels; the feature does not scale. Note Traffic for centralized features is forwarded from member units to the master unit over the cluster control link; see the “Sizing the Cluster Control Link” section on page 1-7 to ensure adequate bandwidth for the cluster control link. If you use the rebalancing feature (see the “Rebalancing New TCP Connections Across the Cluster” section on page 1-17), traffic for centralized features may be rebalanced to non-master units before the traffic is classified as a centralized feature; if this occurs, the traffic is then sent back to the master unit. For centralized features, if the master unit fails, all connections are dropped, and you have to re-establish the connections on the new master unit. • Site-to-site VPN • The following application inspections: – DCERPC – NetBios – PPTP – RADIUS – RSH – SUNRPC – TFTP – XDMCP • Dynamic routing (Spanned EtherChannel mode only) • Multicast routing (Individual interface mode only) • Static route monitoring • IGMP multicast control plane protocol processing (data plane forwarding is distributed across the cluster) • PIM multicast control plane protocol processing (data plane forwarding is distributed across the cluster) • Authentication and Authorization for network access. Accounting is decentralized. • Filtering Services Features Applied to Individual Units These features are applied to each ASA unit, instead of the cluster as a whole or to the master unit.
  • 19. 1-19 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering • QoS—The QoS policy is synced across the cluster as part of configuration replication. However, the policy is enforced on each unit independently. For example, if you configure policing on output, then the conform rate and conform burst values are enforced on traffic exiting a particular ASA. In a cluster with 8 units and with traffic evenly distributed, the conform rate actually becomes 8 times the rate for the cluster. • Threat detection—Threat detection works on each unit independently; for example, the top statistics is unit-specific. Port scanning detection, for example, does not work because scanning traffic will be load-balanced between all units, and one unit will not see all traffic. • Resource management—Resource management in multiple context mode is enforced separately on each unit based on local usage. • IPS module—There is no configuration sync or state sharing between IPS modules. Some IPS signatures require IPS to keep the state across multiple connections. For example, the port scanning signature is used when the IPS module detects that someone is opening many connections to one server but with different ports. In clustering, those connections will be balanced between multiple ASA devices, each of which has its own IPS module. Because these IPS modules do not share state information, the cluster may not be able to detect port scanning as a result. Dynamic Routing • Dynamic Routing in Spanned EtherChannel Mode, page 1-19 • Dynamic Routing in Individual Interface Mode, page 1-20 Dynamic Routing in Spanned EtherChannel Mode In Spanned EtherChannel mode, the routing process only runs on the master unit, and routes are learned through the master unit and replicated to slaves. If a routing packet arrives at a slave, it is redirected to the master unit. Figure 1-1 Dynamic Routing in Spanned EtherChannel Mode 285895 Router A Router B ASAs EtherChannel Load Balancing Only master ASA uses OSPF with neighboring routers. Slave ASAs are invisible.
  • 20. 1-20 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering After the slave members learn the routes from the master unit, each unit makes forwarding decisions independently. The OSPF LSA database is not synchronized from the master unit to slave units. If there is a master unit switchover, the neighboring router will detect a restart; the switchover is not transparent. The OSPF process picks an IP address as its router ID. Although not required, you can assign a static router ID to ensure a consistent router ID is used across the cluster. Dynamic Routing in Individual Interface Mode In Individual interface mode, each unit runs the routing protocol as a standalone router, and routes are learned by each unit independently. Figure 1-2 Dynamic Routing in Individual Interface Mode In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an ASA. ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID when talking to external routers. You must configure a cluster pool for the router ID so that each unit has a separate router ID. Multicast Routing • Multicast Routing in Spanned EtherChannel Mode, page 1-20 • Multicast Routing in Individual Interface Mode, page 1-21 Multicast Routing in Spanned EtherChannel Mode In Spanned EtherChannel mode, the master unit handles all multicast routing packets and data packets until fast-path forwarding is established. After the connection is established, each slave can forward multicast data packets. 285896 Router A Router B ASAs ECMP Load BalancingAll ASAs are using OSPF with neighboring routers
  • 21. 1-21 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering Multicast Routing in Individual Interface Mode In Individual interface mode, units do not act independently with multicast. All data and routing packets are processed and forwarded by the master unit, thus avoiding packet replication. NAT NAT can impact the overall throughput of the cluster. Inbound and outbound NAT packets can be sent to different ASAs in the cluster because the load balancing algorithm relies on IP addresses and ports, and NAT causes inbound and outbound packets to have different IP addresses and/or ports. When a packet arrives at an ASA that is not the connection owner, it is forwarded over the cluster control link to the owner, causing large amounts of traffic on the cluster control link. If you still want to use NAT in clustering, then consider the following guidelines: • No Proxy ARP—For Individual interfaces, a proxy ARP reply is never sent for mapped addresses. This prevents the adjacent router from maintaining a peer relationship with an ASA that may no longer be in the cluster. The upstream router needs a static route or PBR with Object Tracking for the mapped addresses that points to the Main cluster IP address. This is not an issue for a Spanned EtherChannel, because there is only one IP address associated with the cluster interface. • No interface PAT on an Individual interface—Interface PAT is not supported for Individual interfaces. • NAT pool address distribution—The master unit evenly pre-distributes addresses across the cluster. If a member receives a connection and they have no addresses left, the connection is dropped, even if other members still have addresses available. Make sure to include at least as many NAT addresses as there are units in the cluster to ensure that each unit receives an address. Use the show nat pool cluster command to see the address allocations. • No round-robin—Round-robin for a PAT pool is not supported with clustering. • Dynamic NAT xlates managed by the master unit—The master unit maintains and replicates the xlate table to slave units. When a slave unit receives a connection that requires dynamic NAT, and the xlate is not in the table, it requests the xlate from the master unit. The slave unit owns the connection. • Per-session PAT feature—Although not exclusive to clustering, the per-session PAT feature improves the scalability of PAT and, for clustering, allows each slave unit to own PAT connections; by contrast, multi-session PAT connections have to be forwarded to and owned by the master unit. By default, all TCP traffic and UDP DNS traffic use a per-session PAT xlate. For traffic that requires multi-session PAT, such as H.323, SIP, or Skinny, you can disable per-session PAT. For more information about per-session PAT, see the “Per-Session PAT vs. Multi-Session PAT” section on page 1-9 in the firewall configuration guide. • No static PAT for the following inspections— – FTP – PPTP – RSH – SQLNET – TFTP – XDMCP – All Voice-over-IP applications
  • 22. 1-22 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Information About ASA Clustering AAA for Network Access AAA for network access consists of three components: authentication, authorization, and accounting. Authentication and accounting are implemented as centralized features on the clustering master with replication of the data structures to the cluster slaves. If a master is elected, the new master will have all the information it needs to continue uninterrupted operation of the established authenticated users and their associated authorizations. Idle and absolute timeouts for user authentications are preserved when a master unit change occurs. Accounting is implemented as a distributed feature in a cluster. Accounting is done on a per-flow basis, so the cluster unit owning a flow will send accounting start and stop messages to the AAA server when accounting is configured for a flow. Syslog and Netflow • Syslog—Each unit in the cluster generates its own syslog messages. You can configure logging so that each unit uses either the same or a different device ID in the syslog message header field. For example, the hostname configuration is replicated and shared by all units in the cluster. If you configure logging to use the hostname as the device ID, syslog messages generated by all units look as if they come from a single unit. If you configure logging to use the local-unit name that is assigned in the cluster bootstrap configuration as the device ID, syslog messages look as if they come from different units. See the “Including the Device ID in Non-EMBLEM Format Syslog Messages” section on page 1-17. • NetFlow—Each unit in the cluster generates its own NetFlow stream. The NetFlow collector can only treat each ASA as a separate NetFlow exporter. SNMP An SNMP agent polls each individual ASA by its Local IP address. You cannot poll consolidated data for the cluster. You should always use the Local address, and not the Main cluster IP address for SNMP polling. If the SNMP agent polls the Main cluster IP address, if a new master is elected, the poll to the new master unit will fail. VPN Site-to-site VPN is a centralized feature; only the master unit supports VPN connections. Note Remote access VPN is not supported with clustering. VPN functionality is limited to the master unit and does not take advantage of the cluster high availability capabilities. If the master unit fails, all existing VPN connections are lost, and VPN users will see a disruption in service. When a new master is elected, you must reestablish the VPN connections. When you connect a VPN tunnel to a Spanned EtherChannel address, connections are automatically forwarded to the master unit. For connections to an Individual interface when using PBR or ECMP, you must always connect to the Main cluster IP address, not a Local address. VPN-related keys and certificates are replicated to all units.
  • 23. 1-23 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Licensing Requirements for ASA Clustering FTP • If FTP data channel and control channel flows are owned by different cluster members, the data channel owner will periodically send idle timeout updates to the control channel owner and update the idle timeout value. However, if the control flow owner is reloaded, and the control flow is re-hosted, the parent/child flow relationship will not longer be maintained; the control flow idle timeout will not be updated. • If you use AAA for FTP access, then the control channel flow is centralized on the master unit. Cisco TrustSec Only the master unit learns security group tag (SGT) information. The master unit then populates the SGT to slaves, and slaves can make a match decision for SGT based on the security policy. Licensing Requirements for ASA Clustering Prerequisites for ASA Clustering Switch Prerequisites • Be sure to complete the switch configuration before you configure clustering on the ASAs. • Table 1-2 lists supported external hardware and software to interoperate with ASA clustering. ASA Prerequisites • Provide each unit with a unique IP address before you join them to the management network. – See Chapter 1, “Getting Started,” for more information about connecting to the ASA and setting the management IP address. – Except for the IP address used by the master unit (typically the first unit you add to the cluster), these management IP addresses are for temporary use only. Model License Requirement ASA 5580, ASA 5585-X Cluster License, supports up to 8 units. A Cluster license is required on each unit. For other feature licenses, cluster units do not require the same license on each unit. If you have feature licenses on multiple units, they combine into a single running ASA cluster license. Note Each unit must have the same encryption license. All other models No support. Table 1-2 External Hardware and Software Dependencies for ASA Clustering External Hardware External Software ASA Version Nexus 7000 NXOS 5.2(5) 9.0(1) and later. Catalyst 6500 with Supervisor 32, 720, and 720-10GE IOS 12.2(33)SXI7, SXI8, and SXI9 9.0(1) and later.
  • 24. 1-24 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Guidelines and Limitations – After a slave joins the cluster, its management interface configuration is replaced by the one replicated from the master unit. • To use jumbo frames on the cluster control link (recommended), you must enable Jumbo Frame Reservation before you enable clustering. See the “Enabling Jumbo Frame Support (Supported Models)” section on page 1-33. • See also the “ASA Hardware and Software Requirements” section on page 1-3. Other Prerequisites We recommend using a terminal server to access all cluster member unit console ports. For initial setup, and ongoing management (for example, when a unit goes down), a terminal server is useful for remote management. Guidelines and Limitations Context Mode Guidelines Supported in single and multiple context modes. The mode must match on each member unit. Firewall Mode Guidelines Supported in routed and transparent firewall modes. For single mode, the firewall mode must match on all units. Failover Guidelines Failover is not supported with clustering. IPv6 Guidelines Supports IPv6. However, the cluster control link is only supported using IPv4. Model Guidelines Supported on: • ASA 5585-X For the ASA 5585-X with SSP-10 and SSP-20, which includes two Ten Gigabit Ethernet interfaces, we recommend using one interface for the cluster control link, and the other for data (you can use subinterfaces for data). Although this setup does not accommodate redundancy for the cluster control link, it does satisfy the need to size the cluster control link to match the size of the data interfaces. See the “Sizing the Cluster Control Link” section on page 1-7 for more information. • ASA 5580 Switch Guidelines • On the switch(es) for the cluster control link interfaces, you can optionally enable Spanning Tree PortFast on the switch ports connected to the ASA to speed up the join process for new units. • When you see slow bundling of a Spanned EtherChannel on the switch, you can enable LACP rate fast for an Individual interface on the switch.
  • 25. 1-25 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Guidelines and Limitations • On the switch, we recommend that you use one of the following EtherChannel load-balancing algorithms: source-dest-ip or source-dest-ip-port (see the Nexus OS and IOS port-channel load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the ASAs in a cluster. Do not change the load-balancing algorithm from the default on the ASA (in the port-channel load-balance command). • If you change the load-balancing algorithm of the EtherChannel on the switch, the EtherChannel interface on the switch temporarily stops forwarding traffic, and the Spanning Tree Protocol restarts. There will be a delay before traffic starts flowing again. EtherChannel Guidelines • For detailed EtherChannel guidelines, limitations, and prerequisites, see the “Configuring an EtherChannel” section on page 1-28. • See also the “EtherChannel Guidelines” section on page 1-11. • Spanned vs. Device-Local EtherChannel Configuration—Be sure to configure the switch appropriately for Spanned EtherChannels vs. Device-local EtherChannels. – Spanned EtherChannels—For ASA Spanned EtherChannels, which span across all members of the cluster, the interfaces are combined into a single EtherChannel on the switch. Make sure each interface is in the same channel group on the switch. VLAN 101 port-ch1 RIGHT WRONG port-ch2 port-ch3 port-ch4 ASA1 Switch Switch ASA2 ASA3 ASA4 ten0/6 VLAN 101 port-ch1 Spanned Data Ifc port-ch1 ten0/6 ten0/6 ten0/6 ASA1 ASA2 ASA3 ASA4 ten0/6 Spanned Data Ifc port-ch1 ten0/6 ten0/6 ten0/6 334621
  • 26. 1-26 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Guidelines and Limitations – Device-local EtherChannels—For ASA Device-local EtherChannels including any EtherChannels configured for the cluster control link, be sure to configure discrete EtherChannels on the switch; do not combine multiple ASA EtherChannels into one EtherChannel on the switch. Additional Guidelines • See the “ASA Hardware and Software Requirements” section on page 1-3. • For unsupported features with clustering, see the “Unsupported Features” section on page 1-17. • When significant topology changes occur (such as adding or removing an EtherChannel interface, enabling or disabling an interface on the ASA or the switch, adding an additional switch to form a VSS or vPC) you should disable the health check feature. When the topology change is complete, and the configuration change is synced to all units, you can re-enable the health check feature. • When adding a unit to an existing cluster, or when reloading a unit, there will be a temporary, limited packet/connection drop; this is expected behavior. In some cases, the dropped packets can hang your connection; for example, dropping a FIN/ACK packet for an FTP connection will make the FTP client hang. In this case, you need to reestablish the FTP connection. • If you use a Windows 2003 server connected to a Spanned EtherChannel, when the syslog server port is down and the server does not throttle ICMP error messages, then large numbers of ICMP messages are sent back to the ASA cluster. These messages can result in some units of the ASA cluster experiencing high CPU, which can affect performance. We recommend that you throttle ICMP error messages. ASA1 ASA2 ASA3 ASA4 ten0/6 Cluster Control Link port-ch1 ten0/7 port-ch1 port-ch1 port-ch1 VLAN 101 port-ch1 RIGHT WRONG port-ch2 port-ch3 port-ch4 ten0/6 ten0/7 ten0/6 ten0/7 ten0/6 ten0/7 ASA1 ASA2 ASA3 ASA4 ten0/6 Cluster Control Link port-ch1 ten0/7 port-ch1 port-ch1 port-ch1 VLAN 101 port-ch1 ten0/6 ten0/7 ten0/6 ten0/7 ten0/6 ten0/7 333358 Switch Switch
  • 27. 1-27 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Default Settings Default Settings • When using Spanned EtherChannels, the cLACP system ID is auto-generated and the system priority is 1 by default. • The cluster health check feature is enabled by default with the holdtime of 3 seconds. • Connection rebalancing is disabled by default. If you enable connection rebalancing, the default time between load information exchanges is 5 seconds. Configuring ASA Clustering Note To enable or disable clustering, you must use a console connection (for CLI) or an ASDM connection. • Task Flow for ASA Cluster Configuration, page 1-27 • Cabling the Cluster Units and Configuring Upstream and Downstream Equipment, page 1-28 • Configuring the Cluster Interface Mode on Each Unit, page 1-30 • Configuring Interfaces on the Master Unit, page 1-31 • Configuring the Master Unit Bootstrap Settings, page 1-37 • Configuring Slave Unit Bootstrap Settings, page 1-43 Task Flow for ASA Cluster Configuration To configure clustering, perform the following steps: Step 1 Complete all pre-configuration on the switches and ASAs according to the “Prerequisites for ASA Clustering” section on page 1-23. Step 2 Cable your equipment. Before configuring clustering, cable the cluster control link network, management network, and data networks. See the “Cabling the Cluster Units and Configuring Upstream and Downstream Equipment” section on page 1-28. Step 3 Configure the interface mode. You can only configure one type of interface for clustering: Spanned EtherChannels or Individual interfaces. See the “Configuring the Cluster Interface Mode on Each Unit” section on page 1-30. Step 4 Configure interfaces for clustering on the master unit. You cannot enable clustering if the interfaces are not cluster-ready. See the “Configuring Interfaces on the Master Unit” section on page 1-31. Step 5 Configure the bootstrap settings and enable clustering on the master unit. See the “Configuring the Master Unit Bootstrap Settings” section on page 1-37. Step 6 Configure the bootstrap settings for each slave unit. See the “Configuring Slave Unit Bootstrap Settings” section on page 1-43. Step 7 Configure the security policy on the master unit. See the chapters in this guide to configure supported features on the master unit. The configuration is replicated to the slave units. For a list of supported and unsupported features, see the “ASA Features and Clustering” section on page 1-17.
  • 28. 1-28 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Cabling the Cluster Units and Configuring Upstream and Downstream Equipment Before configuring clustering, cable the cluster control link network, management network, and data networks. Note At a minimum, an active cluster control link network is required before you configure the units to join the cluster. You should also configure the upstream and downstream equipment. For example, if you use EtherChannels, then you should configure the upstream and downstream equipment for the EtherChannels. Examples Note This example uses EtherChannels for load-balancing. If you are using PBR or ECMP, your switch configuration will differ. For example on each of 4 ASA 5585-Xs, you want to use: • 2 Ten Gigabit Ethernet interfaces in a device-local EtherChannel for the cluster control link. • 2 Ten Gigabit Ethernet interfaces in a Spanned EtherChannel for the inside and outside network; each interface is a VLAN subinterface of the EtherChannel. Using subinterfaces lets both inside and outside interfaces take advantage of the benefits of an EtherChannel. • 1 Management interface. You have one switch for both the inside and outside networks.
  • 29. 1-29 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Purpose Connect Interfaces on each of 4 ASAs To Switch Ports Cluster control link TenGigabitEthernet 0/6 and TenGigabitEthernet 0/7 8 ports total For each TenGigabitEthernet 0/6 and TenGigabitEthernet 0/7 pair, configure 4 EtherChannels (1 EC for each ASA). These EtherChannels must all be on the same isolated cluster control VLAN, for example VLAN 101. Inside and outside interfaces TenGigabitEthernet 0/8 and TenGigabitEthernet 0/9 8 ports total Configure a single EtherChannel (across all ASAs). On the switch, configure these VLANs and networks now; for example, a trunk including VLAN 200 for the inside and VLAN 201 for the outside. Management interface Management 0/0 4 ports total Place all interfaces on the same isolated management VLAN, for example VLAN 100. ASA1 333150 ten0/6 ten0/7 ten0/8 man0/0 ten0/9 ASA2 ten0/6 ten0/7 ten0/8 man0/0 ten0/9 ASA3 ten0/6 ten0/7 ten0/8 man0/0 ten0/9 ASA4 ten0/6 ten0/7 ten0/8 man0/0 ten0/9 Switch Management VLAN 100 VLAN 101 port-ch1 port-ch2 port-ch3 port-ch4 Cluster Control Link port-ch1 port-ch5 Inside VLAN 200 Outside VLAN 201 Trunk port-ch1 port-ch1 port-ch1 port-ch2 port-ch2.200 Inside VLAN 200 port-ch2.201 Outside VLAN 201
  • 30. 1-30 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next Configure the cluster interface mode on each unit. See the “Configuring the Cluster Interface Mode on Each Unit” section on page 1-30. Configuring the Cluster Interface Mode on Each Unit You can only configure one type of interface for clustering: Spanned EtherChannels or Individual interfaces; you cannot mix interface types in a cluster. For exceptions for the management interface and other guidelines, see the “Interface Type Mode” section on page 1-6. Prerequisites • You must set the mode separately on each ASA that you want to add to the cluster. • Transparent firewall mode supports only Spanned EtherChannel mode. • For multiple context mode, configure this setting in the system execution space; you cannot configure the mode per context. Detailed Steps Command Purpose Step 1 cluster interface-mode {individual | spanned} check-details Example: hostname(config)# cluster interface-mode spanned check-details The check-details command shows any incompatible configuration so you can force the interface mode and fix your configuration later; the mode is not changed with this command. Step 2 cluster interface-mode {individual | spanned} force Example: hostname(config)# cluster interface-mode spanned force Sets the interface mode for clustering. There is no default setting; you must explicitly choose the mode. If you have not set the mode, you cannot enable clustering. The force option changes the mode without checking your configuration for incompatible settings. You need to manually fix any configuration issues after you change the mode. Because any interface configuration can only be fixed after you set the mode, we recommend using the force option so you can at least start from the existing configuration. You can re-run the check-details option after you set the mode for more guidance. Without the force option, if there is any incompatible configuration, you are prompted to clear your configuration and reload, thus requiring you to connect to the console port to reconfigure your management access. If your configuration is compatible (rare), the mode is changed and the configuration is preserved. If you do not want to clear your configuration, you can exit the command by typing n. To remove the interface mode, enter the no cluster interface-mode command.
  • 31. 1-31 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next Configure interfaces. See the “Configuring Interfaces on the Master Unit” section on page 1-31. Configuring Interfaces on the Master Unit You must modify any interface that is currently configured with an IP address to be cluster-ready before you enable clustering. For other interfaces, you can configure them before or after you enable clustering; we recommend pre-configuring all of your interfaces so that the complete configuration is synced to new cluster members. This section describes how to configure interfaces to be compatible with clustering. You can configure data interfaces as either Spanned EtherChannels or as Individual interfaces. Each method uses a different load-balancing mechanism. You cannot configure both types in the same configuration, with the exception of the management interface, which can be an Individual interface even in Spanned EtherChannel mode. For more information, see the “ASA Cluster Interfaces” section on page 1-4. • Configuring Individual Interfaces (Recommended for the Management Interface), page 1-31 • Configuring Spanned EtherChannels, page 1-33 Configuring Individual Interfaces (Recommended for the Management Interface) Individual interfaces are normal routed interfaces, each with their own IP address taken from a pool of IP addresses. The Main cluster IP address is a fixed address for the cluster that always belongs to the current master unit. In Spanned EtherChannel mode, we recommend configuring the management interface as an Individual interface. Individual management interfaces let you connect directly to each unit if necessary, while a Spanned EtherChannel interface only allows connection to the current master unit. See the “Management Interface” section on page 1-10 for more information. Prerequisites • Except for the management-only interface, you must be in Individual interface mode; see the “Configuring the Cluster Interface Mode on Each Unit” section on page 1-30. • For multiple context mode, perform this procedure in each context. If you are not already in the context configuration mode, enter the changeto context name command. • Individual interfaces require you to configure load balancing on neighbor devices. External load balancing is not required for the management interface. For information about load balancing, see the “Load Balancing Methods” section on page 1-12. • (Optional) Configure the interface as a device-local EtherChannel interface, a redundant interface, and/or configure subinterfaces. – For an EtherChannel, see the “Configuring an EtherChannel” section on page 1-28. This EtherChannel is local to the unit, and is not a Spanned EtherChannel. – For a redundant interface, see the “Configuring a Redundant Interface” section on page 1-26. Management-only interfaces cannot be redundant interfaces. – For subinterfaces, see the “Configuring VLAN Subinterfaces and 802.1Q Trunking” section on page 1-31.
  • 32. 1-32 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Detailed Steps Command Purpose Step 1 (IPv4) ip local pool poolname first-address—last-address [mask mask] (IPv6) ipv6 local pool poolname ipv6-address/prefix-length number_of_addresses Example: hostname(config)# ip local pool ins 192.168.1.2-192.168.1.9 hostname(config-if)# ipv6 local pool insipv6 2001:DB8::1002/32 8 Configures a pool of Local IP addresses (IPv4 and/or IPv6), one of which will be assigned to each cluster unit for the interface. Include at least as many addresses as there are units in the cluster. If you plan to expand the cluster, include additional addresses. The Main cluster IP address that belongs to the current master unit is not a part of this pool; be sure to reserve an IP address on the same network for the Main cluster IP address. You cannot determine the exact Local address assigned to each unit in advance; to see the address used on each unit, enter the show ip[v6] local pool poolname command. Each cluster member is assigned a member ID when it joins the cluster. The ID determines the Local IP used from the pool. Step 2 interface interface_id Example: hostname(config)# interface tengigabitethernet 0/8 Enters interface configuration mode. Step 3 (Management interface only) management-only Example: hostname(config-if)# management-only Sets an interface to management-only mode so that it does not pass through traffic. By default, Management type interfaces are configured as management-only. In transparent mode, this command is always enabled for a Management type interface. This setting is required if the cluster interface mode is Spanned. Step 4 nameif name Example: hostname(config-if)# nameif inside Names the interface. The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering this command with a new value. Step 5 (IPv4) ip address ip_address [mask] cluster-pool poolname (IPv6) ipv6 address ipv6-address/prefix-length cluster-pool poolname Example: hostname(config-if)# ip address 192.168.1.1 255.255.255.0 cluster-pool ins hostname(config-if)# ipv6 address 2001:DB8::1002/32 cluster-pool insipv6 Sets the Main cluster IP address and identifies the cluster pool. This IP address must be on the same network as the cluster pool addresses, but not be part of the pool. You can configure an IPv4 and/or an IPv6 address. DHCP, PPPoE, and IPv6 autoconfiguration are not supported; you must manually configure the IP addresses.
  • 33. 1-33 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Examples The following example configures the Management 0/0 and Management 0/1 interfaces as a device-local EtherChannel, and then configures the EtherChannel as an Individual interface: ip local pool mgmt 10.1.1.2-10.1.1.9 ipv6 local pool mgmtipv6 2001:DB8:45:1002/64 8 interface management 0/0 channel-group 1 mode active no shutdown interface management 0/1 channel-group 1 mode active no shutdown interface port-channel 1 nameif management ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt ipv6 address 2001:DB8:45:1001/64 cluster-pool mgmtipv6 security-level 100 management-only What to Do Next • For spanned interface mode, configure your data interfaces. See the “Configuring Spanned EtherChannels” section on page 1-33. • For Individual interface mode, join the cluster. See the “Configuring the Cluster Interface Mode on Each Unit” section on page 1-30. Configuring Spanned EtherChannels A Spanned EtherChannel spans all ASAs in the cluster, and provides load balancing as part of the EtherChannel operation. Prerequisites • You must be in Spanned EtherChannel interface mode; see the “Configuring the Cluster Interface Mode on Each Unit” section on page 1-30. • For multiple context mode, start this procedure in the system execution space. If you are not already in the System configuration mode, enter the changeto system command. Step 6 security-level number Example: hostname(config-if)# security-level 100 Sets the security level, where number is an integer between 0 (lowest) and 100 (highest). See the “Security Levels” section on page 1-1. Step 7 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. Command Purpose
  • 34. 1-34 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering • For transparent mode, configure the bridge group according to the “Configuring Bridge Groups” section on page 1-8. Guidelines • Do not specify the maximum and minimum links in the EtherChannel—We recommend that you do not specify the maximum and minimum links in the EtherChannel (The lacp max-bundle and port-channel min-bundle commands) on either the ASA or the switch. If you need to use them, note the following: – The maximum links set on the ASA is the total number of active ports for the whole cluster. Be sure the maximum links value configured on the switch is not larger than the ASA value. – The minimum links set on the ASA is the minimum active ports to bring up a port-channel interface per unit. On the switch, the minimum links is the minimum links across the cluster, so this value will not match the ASA value. • Do not change the load-balancing algorithm from the default (see the port-channel load-balance command). On the switch, we recommend that you use one of the following algorithms: source-dest-ip or source-dest-ip-port (see the Nexus OS and IOS port-channel load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the ASAs in a cluster. • The lacp port-priority and lacp system-priority commands are not used for a Spanned EtherChannel. • When using Spanned EtherChannels, the port-channel interface will not come up until clustering is fully enabled (see the “Configuring Spanned EtherChannels” section on page 1-33). This requirement prevents traffic from being forwarded to a unit that is not an active unit in the cluster. • For detailed EtherChannel guidelines, limitations, and prerequisites, see the “Configuring an EtherChannel” section on page 1-28. • See also the “EtherChannel Guidelines” section on page 1-11.
  • 35. 1-35 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Detailed Steps Command Purpose Step 1 interface physical_interface Example: hostname(config)# interface gigabitethernet 0/0 Specifies the interface you want to add to the channel group, where the physical_interface ID includes the type, slot, and port number as type slot/port. This first interface in the channel group determines the type and speed for all other interfaces in the group. Step 2 channel-group channel_id mode active [vss-id {1 | 2}] Example: hostname(config-if)# channel-group 1 mode active Assigns this interface to an EtherChannel with the channel_id between 1 and 48. If the port-channel interface for this channel ID does not yet exist in the configuration, one will be added automatically: interface port-channel channel_id Only active mode is supported for Spanned EtherChannels. If you are connecting the ASA to two switches in a VSS or vPC, then configure the vss-id keyword to identify to which switch this interface is connected (1 or 2). You must also use the port-channel span-cluster vss-load-balance command for the port-channel interface in Step 6. See also the “Connecting to a VSS or vPC” section on page 1-13 for more information. Step 3 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. Step 4 (Optional) Add additional interfaces to the EtherChannel by repeating Step 1 through Step 3. Example: hostname(config)# interface gigabitethernet 0/1 hostname(config-if)# channel-group 1 mode active hostname(config-if)# no shutdown Multiple interfaces in the EtherChannel per unit are useful for connecting to switches in a VSS or vPC. Keep in mind that an EtherChannel, can have only 8 active interfaces out of 16 maximum; the remaining 8 interfaces are on standby in case of link failure. For example, for a cluster of 8 ASAs, you can use a maximum of 2 interfaces on each ASA, for a total of 16 interfaces in the EtherChannel. Step 5 interface port-channel channel_id Example: hostname(config)# interface port-channel 1 Specifies the port-channel interface. This interface was created automatically when you added an interface to the channel group. Step 6 port-channel span-cluster [vss-load-balance] Example: hostname(config-if)# port-channel span-cluster Sets this EtherChannel as a Spanned EtherChannel. If you are connecting the ASA to two switches in a VSS or vPC, then you should enable VSS load balancing by using the vss-load-balance keyword. This feature ensures that the physical link connections between the ASAs to the VSS (or vPC) pair are balanced. You must configure the vss-id keyword in the channel-group command for each member interface before enabling load balancing (see Step 2).
  • 36. 1-36 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Step 7 (Optional) You can set the Ethernet properties for the port-channel interface to override the properties set on the Individual interfaces. This method provides a shortcut to set these parameters because these parameters must match for all interfaces in the channel group. See the “Enabling the Physical Interface and Configuring Ethernet Parameters” section on page 1-23 for Ethernet commands. Step 8 (Optional) If you are creating VLAN subinterfaces on this EtherChannel, do so now. The rest of this procedure applies to the subinterfaces. Example: hostname(config)# interface port-channel 1.10 hostname(config-if)# vlan 10 See the “Configuring VLAN Subinterfaces and 802.1Q Trunking” section on page 1-31. Step 9 (Multiple Context Mode) Allocate the interface to a context. See the “Configuring a Security Context” section on page 1-19. Then enter: changeto context name interface port-channel channel_id Example: hostname(config)# context admin hostname(config)# allocate-interface port-channel1 hostname(config)# changeto context admin hostname(config-if)# interface port-channel 1 For multiple context mode, the rest of the interface configuration occurs within each context. Step 10 nameif name Example: hostname(config-if)# nameif inside Names the interface. The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering this command with a new value. Step 11 Perform one of the following, depending on the firewall mode: Routed Mode: (IPv4) ip address ip_address [mask] (IPv6) ipv6 address ipv6-prefix/prefix-length Example: hostname(config-if)# ip address 10.1.1.1 255.255.255.0 hostname(config-if)# ipv6 address 2001:DB8::1001/32 Sets the IPv4 and/or IPv6 address. DHCP, PPPoE, and IPv6 autoconfig are not supported. Command Purpose
  • 37. 1-37 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next Configure the master unit bootstrap settings. See the “Configuring the Master Unit Bootstrap Settings” section on page 1-37. Configuring the Master Unit Bootstrap Settings Each unit in the cluster requires a bootstrap configuration to join the cluster. Typically, the first unit you configure to join the cluster will be the master unit. After you enable clustering, after an election period, the cluster elects a master unit. With only one unit in the cluster initially, that unit will become the master unit. Subsequent units that you add to the cluster will be slave units. • Prerequisites, page 1-38 • Enabling the Cluster Control Link Interface, page 1-38 • Configuring Basic Bootstrap Settings and Enabling Clustering, page 1-40 • Configuring Advanced Clustering Settings, page 1-42 • Examples, page 1-43 Transparent Mode: bridge-group number Example: hostname(config-if)# bridge-group 1 Assigns the interface to a bridge group, where number is an integer between 1 and 100. You can assign up to four interfaces to a bridge group. You cannot assign the same interface to more than one bridge group. Note that the BVI configuration includes the IP address. Step 12 security-level number Example: hostname(config-if)# security-level 50 Sets the security level, where number is an integer between 0 (lowest) and 100 (highest). See the “Security Levels” section on page 1-1. Step 13 mac-address mac_address Example: hostname(config-if)# mac-address 000C.F142.4CDE You must configure a MAC address for a Spanned EtherChannel so that the MAC address does not change when the current master unit leaves the cluster; with a manually-configured MAC address, the MAC address stays with the current master unit. In multiple context mode, if you share an interface between contexts, auto-generation of MAC addresses is enabled by default, so you only need to set the MAC address manually for a shared interface if you disable auto-generation. Note that you must manually configure the MAC address for non-shared interfaces. The mac_address is in H.H.H format, where H is a 16-bit hexadecimal digit. For example, the MAC address 00-0C-F1-42-4C-DE is entered as 000C.F142.4CDE. The first two bytes of a manual MAC address cannot be A2 if you also want to use auto-generated MAC addresses. Command Purpose
  • 38. 1-38 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Prerequisites • You must use the console port to enable or disable clustering. You cannot use Telnet or SSH. • Back up your configurations in case you later want to leave the cluster, and need to restore your configuration. • For multiple context mode, complete these procedures in the system execution space. To change from the context to the system execution space, enter the changeto system command. • We recommend enabling jumbo frame reservation for use with the cluster control link. See the “Enabling Jumbo Frame Support (Supported Models)” section on page 1-33. • With the exception of the cluster control link, any interfaces in your configuration must be configured with a cluster IP pool or as a Spanned EtherChannel before you enable clustering, depending on your interface mode. If you have pre-existing interface configuration, you can either clear the interface configuration (clear configure interface), or convert your interfaces to cluster interfaces according to the “Configuring Interfaces on the Master Unit” section on page 1-31 before you enable clustering. • When you add a unit to a running cluster, you may see temporary, limited packet/connection drops; this is expected behavior. Enabling the Cluster Control Link Interface You need to enable the cluster control link interface before you join the cluster. You will later identify this interface as the cluster control link when you enable clustering. We recommend that you combine multiple cluster control link interfaces into an EtherChannel if you have enough interfaces. The EtherChannel is local to the ASA, and is not a Spanned EtherChannel. The cluster control link interface configuration is not replicated from the master unit to slave units; however, you must use the same configuration on each unit. Because this configuration is not replicated, you must configure the cluster control link interfaces separately on each unit. Prerequisites Determine the size of the cluster control link by referring to the “Sizing the Cluster Control Link” section on page 1-7. Restrictions • You cannot use a VLAN subinterface as the cluster control link. • You cannot use a Management x/x interface as the cluster control link, either alone or as an EtherChannel. • For the ASA 5585-X with an ASA IPS or ASA CX module, you cannot use the module interfaces for the cluster control link.
  • 39. 1-39 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Detailed Steps—Single Interface Detailed Steps—EtherChannel Interface Command Purpose Step 1 interface interface_id Example: hostname(config)# interface tengigabitethernet 0/6 Enters interface configuration mode. Step 2 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. You only need to enable the interface; do not configure a name for the interface, or any other parameters. Command Purpose Step 1 interface interface_id Example: hostname(config)# interface tengigabitethernet 0/6 Enters interface configuration mode. Step 2 channel-group channel_id mode on Example: hostname(config-if)# channel-group 1 mode on Assigns this physical interface to an EtherChannel with the channel_id between 1 and 48. If the port-channel interface for this channel ID does not yet exist in the configuration, one will be added automatically: interface port-channel channel_id We recommend using the On mode for cluster control link member interfaces to reduce unnecessary traffic on the cluster control link. The cluster control link does not need the overhead of LACP traffic because it is an isolated, stable network. Note: We recommend setting data EtherChannels to Active mode. Step 3 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. Step 4 interface interface_id channel-group channel_id mode on no shutdown Example: hostname(config)# interface tengigabitethernet 0/7 hostname(config-if)# channel-group 1 mode on hostname(config-if)# no shutdown Repeat for each additional interface you want to add to the EtherChannel.
  • 40. 1-40 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next Configure the master unit bootstrap settings. See the Configuring Basic Bootstrap Settings and Enabling Clustering, page 1-40. Configuring Basic Bootstrap Settings and Enabling Clustering Perform the following steps to configure basic bootstrap settings and to enable clustering. Detailed Steps Command Purpose Step 1 (Optional) mtu cluster bytes Example: hostname(config)# mtu cluster 9000 Specifies the maximum transmission unit for the cluster control link interface, between 64 and 65,535 bytes. The default MTU is 1500 bytes. Note We suggest setting the MTU to 1600 bytes or greater, which requires you to enable jumbo frame reservation before continuing with this procedure. See the “Enabling Jumbo Frame Support (Supported Models)” section on page 1-33. Jumbo frame reservation requires a reload of the ASA. This command is a global configuration command, but is also part of the bootstrap configuration that is not replicated between units. Step 2 cluster group name Example: hostname(config)# cluster group pod1 Names the cluster and enters cluster configuration mode. The name must be an ASCII string from 1 to 38 characters. You can only configure one cluster group per unit. All members of the cluster must use the same name. Step 3 local-unit unit_name Example: hostname(cfg-cluster)# local-unit unit1 Names this member of the cluster with a unique ASCII string from 1 to 38 characters. Each unit must have a unique name. A unit with a duplicated name will be not be allowed in the cluster. Step 4 cluster-interface interface_id ip ip_address mask Example: hostname(cfg-cluster)# cluster-interface port-channel2 ip 192.168.1.1 255.255.255.0 INFO: Non-cluster interface config is cleared on Port-Channel2 Specifies the cluster control link interface, preferably an EtherChannel. Subinterfaces and Management interfaces are not allowed. See the “Configuring Interfaces on the Master Unit” section on page 1-31 Specify an IPv4 address for the IP address; IPv6 is not supported for this interface. This interface cannot have a nameif configured. For each unit, specify a different IP address on the same network. Step 5 priority priority_number Example: hostname(cfg-cluster)# priority 1 Sets the priority of this unit for master unit elections, between 1 and 100, where 1 is the highest priority. See the “Master Unit Election” section on page 1-3 for more information.
  • 41. 1-41 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Step 6 (Optional) key shared_secret Example: hostname(cfg-cluster)# key chuntheunavoidable Sets an authentication key for control traffic on the cluster control link. The shared secret is an ASCII string from 1 to 63 characters. The shared secret is used to generate the key. This command does not affect datapath traffic, including connection state update and forwarded packets, which are always sent in the clear. Step 7 (Optional) clacp system-mac {mac_address | auto} [system-priority number] Example: hostname(cfg-cluster)# clacp system-mac 000a.0000.aaaa When using Spanned EtherChannels, the ASA uses cLACP to negotiate the EtherChannel with the neighbor switch. ASAs in a cluster collaborate in cLACP negotiation so that they appear as a single (virtual) device to the switch. One parameter in cLACP negotiation is a system ID, which is in the format of a MAC address. All ASAs in the cluster use the same system ID: auto-generated by the master unit (the default) and replicated to all slaves; or manually specified in this command in the form H.H.H, where H is a 16-bit hexadecimal digit. (For example, the MAC address 00-0A-00-00-AA-AA is entered as 000A.0000.AAAA.) You might want to manually configure the MAC address for troubleshooting purposes, for example, so you can use an easily identified MAC address. Typically, you would use the auto-generated MAC address. The system priority, between 1 and 65535, is used to decide which unit is in charge of making a bundling decision. By default, the ASA uses priority 1, which is the highest priority. The priority needs to be higher than the priority on the switch. This command is not part of the bootstrap configuration, and is replicated from the master unit to the slave units. However, you cannot change this value after you enable clustering. Step 8 enable [noconfirm] Example: hostname(cfg-cluster)# enable INFO: Clustering is not compatible with following commands: policy-map global_policy class inspection_default inspect skinny policy-map global_policy class inspection_default inspect sip Would you like to remove these commands? [Y]es/[N]o:Y INFO: Removing incompatible commands from running configuration... Cryptochecksum (changed): f16b7fc2 a742727e e40bc0b0 cd169999 INFO: Done Enables clustering. When you enter the enable command, the ASA scans the running configuration for incompatible commands for features that are not supported with clustering, including commands that may be present in the default configuration. You are prompted to delete the incompatible commands. If you respond No, then clustering is not enabled. Use the noconfirm keyword to bypass the confirmation and delete incompatible commands automatically. For the first unit enabled, a master unit election occurs. Because the first unit should be the only member of the cluster so far, it will become the master unit. Do not perform any configuration changes during this period. To disable clustering, enter the no enable command. Note If you disable clustering, all data interfaces are shut down, and only the management-only interface is active. If you want to remove the unit from the cluster entirely (and thus want to have active data interfaces), see the “Leaving the Cluster” section on page 1-49. Command Purpose
  • 42. 1-42 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next • Configure advanced settings. See the “Configuring Advanced Clustering Settings” section on page 1-42. • Add slave units. See the “Configuring Slave Unit Bootstrap Settings” section on page 1-43. Configuring Advanced Clustering Settings Perform the following steps to customize your clustering configuration. Detailed Steps Command Purpose Step 1 health-check [holdtime timeout] Example: hostname(cfg-cluster)# health-check holdtime 5 Customizes the cluster health check feature, which includes unit health monitoring and interface health monitoring. The holdime determines the amount of time between keepalive or interface status messages, between .8 and 45 seconds. The default is 3 seconds. To determine unit health, the ASA cluster units send keepalive messages on the cluster control link to other units. If a unit does not receive any keepalive messages from a peer unit within the holdtime period, the peer unit is considered unresponsive or dead. Interface status messages detect link failure. If an interface fails on a particular unit, but the same interface is active on other units, then the unit is removed from the cluster. If a unit does not receive interface status messages within the holdtime, then the amount of time before the ASA removes a member from the cluster depends on the type of interface and whether the unit is an established member or is joining the cluster. For EtherChannels (spanned or not), if the interface is down on an established member, then the ASA removes the member after 9 seconds. If the unit is joining the cluster as a new member, the ASA waits 45 seconds before rejecting the new unit. For non-EtherChannels, the unit is removed after 500 ms, regardless of the member state. Health check is enabled by default. You can disable it using the no form of this command. Note When any topology changes occur (such as adding or removing a data interface, enabling or disabling an interface on the ASA or the switch, or adding an additional switch to form a VSS or vPC) you should disable the health check feature. When the topology change is complete, and the configuration change is synced to all units, you can re-enable the health check feature.
  • 43. 1-43 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering What to Do Next Add slave units. See the “Configuring Slave Unit Bootstrap Settings” section on page 1-43. Examples The following example configures a management interface, configures a device-local EtherChannel for the cluster control link, and then enables clustering for the ASA called “unit1,” which will become the master unit because it is added to the cluster first: ip local pool mgmt 10.1.1.2-10.1.1.9 ipv6 local pool mgmtipv6 2001:DB8::1002/32 8 interface management 0/0 nameif management ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt ipv6 address 2001:DB8::1001/32 cluster-pool mgmtipv6 security-level 100 management-only no shutdown interface tengigabitethernet 0/6 channel-group 1 mode on no shutdown interface tengigabitethernet 0/7 channel-group 1 mode on no shutdown cluster group pod1 local-unit unit1 cluster-interface port-channel1 ip 192.168.1.1 255.255.255.0 priority 1 key chuntheunavoidable enable noconfirm Configuring Slave Unit Bootstrap Settings Perform the following procedures to configure the slave units. Step 2 conn-rebalance [frequency seconds] Example: hostname(cfg-cluster)# conn-rebalance frequency 60 Enables connection rebalancing for TCP traffic. This command is disabled by default. If enabled, ASAs exchange load information periodically, and offload new connections from more loaded devices to less loaded devices. The frequency, between 1 and 360 seconds, specifies how often the load information is exchanged. The default is 5 seconds. Step 3 console-replicate Example: hostname(cfg-cluster)# console-replicate Enables console replication from slave units to the master unit. This feature is disabled by default. The ASA prints out some messages directly to the console for certain critical events. If you enable console replication, slave units send the console messages to the master unit so you only need to monitor one console port for the cluster. Command Purpose
  • 44. 1-44 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering • Prerequisites, page 1-44 • Enabling the Cluster Control Link Interface, page 1-44 • Configuring Bootstrap Settings and Joining the Cluster, page 1-45 • Examples, page 1-47 Prerequisites • You must use the console port to enable or disable clustering. You cannot use Telnet or SSH. • Back up your configurations in case you later want to leave the cluster, and need to restore your configuration. • For multiple context mode, complete this procedure in the system execution space. To change from the context to the system execution space, enter the changeto system command. • We recommend enabling jumbo frame reservation for use with the cluster control link. See the “Enabling Jumbo Frame Support (Supported Models)” section on page 1-33. • If you have any interfaces in your configuration that have not been configured for clustering (for example, the default configuration Management 0/0 interface), you can join the cluster as a slave unit (with no possibility of becoming the master in a current election). • When you add a unit to a running cluster, you may see temporary, limited packet/connection drops; this is expected behavior. Enabling the Cluster Control Link Interface Configure the same cluster control link interface as you configured for the master unit. See the “Enabling the Cluster Control Link Interface” section on page 1-38. Detailed Steps—Single Interface Command Purpose Step 1 interface interface_id Example: hostname(config)# interface tengigabitethernet 0/6 Enters interface configuration mode. Step 2 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. You only need to enable the interface; do not configure a name for the interface, or any other parameters.
  • 45. 1-45 Cisco ASA Series CLI Configuration Guide Chapter 1 Configuring a Cluster of ASAs Configuring ASA Clustering Detailed Steps—EtherChannel Interface What to Do Next Configure the slave unit bootstrap settings. See the Configuring Bootstrap Settings and Joining the Cluster, page 1-45. Configuring Bootstrap Settings and Joining the Cluster Perform the following steps to configure bootstrap settings and join the cluster as a slave unit. Command Purpose Step 1 interface interface_id Example: hostname(config)# interface tengigabitethernet 0/6 Enters interface configuration mode. Step 2 channel-group channel_id mode on Example: hostname(config-if)# channel-group 1 mode on Assigns this physical interface to an EtherChannel with the channel_id between 1 and 48. If the port-channel interface for this channel ID does not yet exist in the configuration, one will be added automatically: interface port-channel channel_id We recommend using the On mode for cluster control link member interfaces to reduce unnecessary traffic on the cluster control link. The cluster control link does not need the overhead of LACP traffic because it is an isolated, stable network. Note: We recommend setting data EtherChannels to Active mode. Step 3 no shutdown Example: hostname(config-if)# no shutdown Enables the interface. Step 4 interface interface_id channel-group channel_id mode on no shutdown Example: hostname(config)# interface tengigabitethernet 0/7 hostname(config-if)# channel-group 1 mode on hostname(config-if)# no shutdown Repeat for each additional interface you want to add to the EtherChannel.